2020
DOI: 10.1109/tifs.2020.2981282
|View full text |Cite
|
Sign up to set email alerts
|

On the Information Leakage in Private Information Retrieval Systems

Abstract: We consider information leakage to the user in private information retrieval (PIR) systems. Information leakage can be measured in terms of individual message leakage or total leakage. Individual message leakage, or simply individual leakage, is defined as the amount of information that the user can obtain on any individual message that is not being requested, and the total leakage is defined as the amount of information that the user can obtain about all the other messages except the one being requested. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 38 publications
(12 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…In particular, we show a three-way tradeoff between download cost, user privacy, and DB privacy, such that enhancing one of them would be at the expense of the other two. We also show matching results for the following special cases for our derived bounds on the AL-PIR model: a) perfect user privacy (original PIR) [7], b) perfect user and DB privacy (SPIR) [9], c) Leaky user privacy (L-PIR) [55], and d) perfect user privacy and leaky DB privacy [58].…”
Section: Introductionmentioning
confidence: 80%
See 4 more Smart Citations
“…In particular, we show a three-way tradeoff between download cost, user privacy, and DB privacy, such that enhancing one of them would be at the expense of the other two. We also show matching results for the following special cases for our derived bounds on the AL-PIR model: a) perfect user privacy (original PIR) [7], b) perfect user and DB privacy (SPIR) [9], c) Leaky user privacy (L-PIR) [55], and d) perfect user privacy and leaky DB privacy [58].…”
Section: Introductionmentioning
confidence: 80%
“…Other leaky user privacy definitions: To relax DB privacy, we adopt the mutual information metric in [58]. On the other hand, we use the probability metric we introduced in [55] to bound the leakage of user privacy.…”
Section: System Model: Asymmetric Leaky Pirmentioning
confidence: 99%
See 3 more Smart Citations