2022
DOI: 10.48550/arxiv.2201.12327
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Communication Cost of Two-Database Symmetric Private Information Retrieval: A Conditional Disclosure of Multiple Secrets Perspective

Abstract: We consider the total (upload plus download) communication cost of two-database symmetric private information retrieval (SPIR) through its relationship to conditional disclosure of secrets (CDS). In SPIR, a user wishes to retrieve a message out of K messages from N non-colluding and replicated databases without learning anything beyond the retrieved message, while no individual database learns the retrieved message index. In CDS, two parties each holding an individual input and sharing a common secret wish to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In the case of K = 3, M 1 and M 2 both take the value 3, after converting the random reliability constraint and user privacy constraint into pairwise constraints as in ( 22)-( 25), we can proceed with the converse steps. As in the converse proof in the case of K = 2 above, the concrete process is to utilize the converse proof of [46,Theorem 2] once more after eliminating the influence of retrieval strategy randomness and its generated queries. Thus, we have the same conclusions as the one in [46,Theorem 2] in the case of K = 3,…”
Section: Converse Proofmentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of K = 3, M 1 and M 2 both take the value 3, after converting the random reliability constraint and user privacy constraint into pairwise constraints as in ( 22)-( 25), we can proceed with the converse steps. As in the converse proof in the case of K = 2 above, the concrete process is to utilize the converse proof of [46,Theorem 2] once more after eliminating the influence of retrieval strategy randomness and its generated queries. Thus, we have the same conclusions as the one in [46,Theorem 2] in the case of K = 3,…”
Section: Converse Proofmentioning
confidence: 99%
“…As in the converse proof in the case of K = 2 above, the concrete process is to utilize the converse proof of [46,Theorem 2] once more after eliminating the influence of retrieval strategy randomness and its generated queries. Thus, we have the same conclusions as the one in [46,Theorem 2] in the case of K = 3,…”
Section: Converse Proofmentioning
confidence: 99%
“…First, when the graph G is bipartite (e.g., Fig. 1), the secure storage problem can be viewed a generalization of the conditional disclosure of secrets (CDS) problem [1][2][3][4][5]. To see this, we view the nodes on one side (e.g., V 1 , V 2 , V 3 , V 4 in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…If and only if the signal indices (node indices) satisfy some function (i.e., the type of the edge corresponds to some source symbols), Carol who receives both signals can recover the corresponding secrets. Compared to the classic CDS problem where there is only one secret (source symbol) to disclose, the secure storage problem generalizes to include multiple secrets [5]; further, an arbitrary subset of all secrets can be conditionally disclosed.…”
Section: Introductionmentioning
confidence: 99%