We consider the problem of private information retrieval (PIR) and symmetric private information retrieval (SPIR) from replicated databases with colluding servers, in the presence of Byzantine adversaries and eavesdroppers. Specifically, there are K messages replicatively stored at N databases. A user wants to retrieve one message by communicating with the databases, without revealing the identity of the message retrieved. For T -colluding databases, any T out of N databases may communicate their interactions with the user to guess the identity of the requested message. We consider the situation where the communication system can be vulnerable to attachers, namely, there is an adversary in the system that can tap in on or even try to corrupt the communication. The capacity is defined as the maximum number of information bits of the desired message retrieved per downloaded bit. For SPIR, it is further required that the user learns nothing about the other K − 1 messages in the database. Three types of adversaries are considered: a Byzantine adversary who can overwrite the transmission of any B servers to the user; a passive eavesdropper who can tap in on the incoming and outgoing transmissions of any E servers; and a combination of both -an adversary who can tap in on a set of any E nodes, and overwrite the transmission of a set of any B nodes. The problems of SPIR with colluding servers and the three types of adversaries are named T-BSPIR, T-ESPIR and T-BESPIR respectively. We derive the capacities of the three secure SPIR problems. The results resemble those of secure network coding problems with adversaries and eavesdroppers. The capacity of T -colluding PIR with Byzantine adversaries is characterized in [1]. In this work, we consider T -colluding PIR with an eavedropper (named T-EPIR). We derive the T-EPIR capacity when E ≥ T ; for the case where E ≤ T , we find an outer bound (converse bound) and an inner bound (achievability) on the optimal achievable rate.
I. INTRODUCTIONWith the evolution of the Internet of things, big data, cloud storage and computing, much of the emerging technology relies on open systems and networks, which brings up new challenges in preserving data privacy and security in such applications. Recently, various privacy and security problems in the storage, fetching, and communication of data have been studied using tools from information theory, among which the problem of private information retrieval brought up in the 90s Manuscript