2017 IEEE International Symposium on Information Theory (ISIT) 2017
DOI: 10.1109/isit.2017.8006508
|View full text |Cite
|
Sign up to set email alerts
|

Nearly optimal constructions of PIR and batch codes

Abstract: Abstract-In this work we study two families of codes with availability, namely private information retrieval (PIR) codes and batch codes. While the former requires that every information symbol has k mutually disjoint recovering sets, the latter asks this property for every multiset request of k information symbols. The main problem under this paradigm is to minimize the number of redundancy symbols. We denote this value by r P (n, k), r B (n, k), for PIR, batch codes, respectively, where n is the number of in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
49
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(51 citation statements)
references
References 14 publications
2
49
0
Order By: Relevance
“…, m} be disjoint sets of servers, chosen so that the cells in each subset of servers span a subspace containing x i . We choose these subsets so that k i is as large as possible subject to this condition; so k = min{k 1…”
Section: Upper Boundsmentioning
confidence: 99%
See 1 more Smart Citation
“…, m} be disjoint sets of servers, chosen so that the cells in each subset of servers span a subspace containing x i . We choose these subsets so that k i is as large as possible subject to this condition; so k = min{k 1…”
Section: Upper Boundsmentioning
confidence: 99%
“…The classical model of PIR assumes that each server stores a copy of an n-bit database, so the storage overhead, namely the ratio between the total number of bits stored by all servers and the size of the database, is k. However, recent work combines PIR protocols with techniques from distributed storage (where each server stores only some of the database) to reduce the storage overhead. This approach was first considered in [33], and several papers have developed this direction further: [1,2,3,4,5,13,14,15,32,36,37,38,39,43,45]. Our discussion will follow the breakthrough approach presented by Fazeli, Vardy, and Yaakobi [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…Those constructions were based on unbalanced expanders, on recursive application of trivial batch codes, on smooth and Reed-Muller codes, and others. Many other constructions proposed later in [2]- [4] improve the redundancy of batch codes. In particular, a systematic linear code, defined by the generator matrix G = [I n |E], is shown [3] to be a kbatch code, where k is the minimal number of ones in rows of E and the bipartite graph, whose biadjacency matrix is E, has no cycle of length at most 6.…”
Section: B Related Workmentioning
confidence: 99%
“…Server S 1 receives q 1 , and so (since W ⊆ T ) replies with c * 1 . But there are at most 2 d possible replies c ℓ other from the remaining servers by (1), and so there are at most 2 d responses (c * 1 , c ℓ other ) to the query (q 1 , q ℓ other ). Since |W | = 2 d + 1, there are two databases X, Y ∈ W such that the servers respond identically.…”
Section: Lower Bounds On the Download Complexitymentioning
confidence: 99%
“…A new subspace approach for such codes was given recently in [36,37]. Another family of related codes with similar properties are batch codes, which were first defined by Ishai, Kushilevitz, Ostrovsky, and Sahai [26] and were recently studied by many others, for example [1,2,35]. It is important to note that all these codes are very important in the theory of distributed storage codes.…”
mentioning
confidence: 99%