2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849351
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Private Information Retrieval with Mismatched Coded Messages and Randomness

Abstract: We consider the problem of symmetric private information retrieval (SPIR) with user-side common randomness. In SPIR, a user retrieves a message out of K messages from N non-colluding and replicated databases in such a way that no single database knows the retrieved message index (user privacy), and the user gets to know nothing further than the retrieved message (database privacy). SPIR has a capacity smaller than the PIR capacity which requires only user privacy, is infeasible in the case of a single database… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
19
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 30 publications
2
19
0
Order By: Relevance
“…An achievable SPIR scheme is a scheme that satisfies the reliability constraint (6), the user privacy constraint (7) and the database privacy constraint (8). In this paper, we focus on the overall communication cost, which is a sum of the number of uploaded bits (named upload cost and denoted by U ) and the number of downloaded bits (named download cost and denoted by D), within the retrieval scheme.…”
Section: A Symmetric Private Information Retrievalmentioning
confidence: 99%
“…An achievable SPIR scheme is a scheme that satisfies the reliability constraint (6), the user privacy constraint (7) and the database privacy constraint (8). In this paper, we focus on the overall communication cost, which is a sum of the number of uploaded bits (named upload cost and denoted by U ) and the number of downloaded bits (named download cost and denoted by D), within the retrieval scheme.…”
Section: A Symmetric Private Information Retrievalmentioning
confidence: 99%
“…are random noises that are used to guarantee T 1 = 2-private queries, and the coefficients α 4 , α 2 in Q (f1),1,1 i (α) and α 5 , α 3 in Q (f1),1,2 i (α) are used to separate the desired terms from the interference. This can be checked by expanding the answer polynomial A s (α) (46), as follows. In round s = 1,…”
Section: B Illustrative Example For U-b-mds-tpirmentioning
confidence: 99%
“…In addition, each user must not learn any information about the other users' indices and the data files more than the desired one. The two constraints are called blind privacy and server privacy respectively, which are ensured by allowing all the servers to hold some correlated random variables that are independent of the files meanwhile unavailable to the users [30], [42], [44], [45], [46], and these variables are referred to as the randomness. The PIR problem with server privacy is called Symmetric PIR (SPIR).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…[8]- [17]. Symmetric PIR schemes were considered in [18], [19]. Moreover, the capacity of [n, k]-MDS-coded PIR schemes was found by Banawan and Ulukus [10].…”
Section: Introductionmentioning
confidence: 99%