2018
DOI: 10.1109/tifs.2018.2833050
|View full text |Cite
|
Sign up to set email alerts
|

Private Information Retrieval for Secure Distributed Storage Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
38
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(39 citation statements)
references
References 24 publications
1
38
0
Order By: Relevance
“…Note that this expression matches the achievable rate bound of [31]. However, it is strictly smaller than, 1 − 2/N , the asymptotic capacity of XSTPIR for this setting.…”
Section: Alignment Of Noise and Interferencesupporting
confidence: 66%
See 1 more Smart Citation
“…Note that this expression matches the achievable rate bound of [31]. However, it is strictly smaller than, 1 − 2/N , the asymptotic capacity of XSTPIR for this setting.…”
Section: Alignment Of Noise and Interferencesupporting
confidence: 66%
“…However, it is strictly smaller than, 1 − 2/N , the asymptotic capacity of XSTPIR for this setting. Evidently, the natural MDS-PIR solution, and the secret sharing based scheme of [31], are asymptotically suboptimal. In fact, the MDS-PIR solution falls short of the asymptotic (K → ∞) capacity of XSTPIR, even if the MDS-PIR scheme is only required to deal with K = 2 messages.…”
Section: Alignment Of Noise and Interferencementioning
confidence: 99%
“…In order to execute queries and compute statistics on distributed datasets, multiple decentralized solutions [10], [12], [14], [22], [23], [24], [25] rely on techniques that have a high expressive power, such as secret sharing and garbled circuits. These solutions are often flexible in the computations they offer but usually assume (a) honest-but-curious computing parties and (b) no collusion or a 2-party model.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding future work, one interesting direction is to investigate the information-theoretic limits of the problem where the eavesdropper can also tap in on the storage at the servers (schemes are provided in a recent work [23]). The other promising direction is to explore the T -colluding PIR problem with a combination adversary who can both eavesdrop and corrupt communications.…”
Section: Discussionmentioning
confidence: 99%