2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2017
DOI: 10.1109/allerton.2017.8262857
|View full text |Cite
|
Sign up to set email alerts
|

The capacity of cache aided private information retrieval

Abstract: The problem of cache enabled private information retrieval (PIR) is considered in which a user wishes to privately retrieve one out of K messages, each of size L bits from N distributed databases. The user has a local cache of storage SL bits which can be used to store any function of the K messages. The main contribution of this work is the exact characterization of the capacity of cache enabled PIR as a function of the storage parameter S. In particular, for a given cache storage parameter S, the information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

3
120
0
1

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(124 citation statements)
references
References 20 publications
3
120
0
1
Order By: Relevance
“…The question we wish to address in this section is what the root cause is for these improvements. It is clear that the existing codes in the literature, such as [1,2,12,14,16,21], are all symmetric, while our proposed code is not symmetric. It is thus natural to suspect that this symmetry vs. asymmetry relation is the root cause, however, in order to better understand this issue, we have to identify and evaluate carefully the symmetry relations in the problem.…”
Section: Symmetry and Symmetrized Codesmentioning
confidence: 93%
See 1 more Smart Citation
“…The question we wish to address in this section is what the root cause is for these improvements. It is clear that the existing codes in the literature, such as [1,2,12,14,16,21], are all symmetric, while our proposed code is not symmetric. It is thus natural to suspect that this symmetry vs. asymmetry relation is the root cause, however, in order to better understand this issue, we have to identify and evaluate carefully the symmetry relations in the problem.…”
Section: Symmetry and Symmetrized Codesmentioning
confidence: 93%
“…In the previous works where the PIR capacity is concerned, such as [1,2,12,14,[16][17][18], it is usually assumed that the message length L is sufficiently large (L is allowed to go to infinity). As a consequence, the corresponding code constructions in the literature are usually built by recursively layering message symbols and parity symbols using symmetry relations, resulting in codes that can only be applied on very long messages.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, capacity is known for disjoint colluding sets [4]. The rapidly growing body of literature in this area has produced capacity results for PIR under a rich variety of constraints [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. However, the capacity for the natural setting of secure storage remains unknown, and relatively unexplored.…”
Section: Introductionmentioning
confidence: 99%
“…The most relevant to our paper is the line of work that focuses on setting with multiple retrieved messages [8], [12], [13] as well as settings in which the user access to certain files as side information before the information retrieval process begins. The side information settings have been studied in [2], [3] for the single server setting and in [4]- [8] for the multi-server setting.…”
Section: B Related Workmentioning
confidence: 99%