2021
DOI: 10.48550/arxiv.2101.04821
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Two-Level Private Information Retrieval

Abstract: In the conventional robust T -colluding private information retrieval (PIR) system, the user needs to retrieve one of the possible messages while keeping the identity of the requested message private from any T colluding servers. Motivated by the possible heterogeneous privacy requirements for different messages, we consider the (N, T 1 : K 1 , T 2 : K 2 ) two-level PIR system, where K 1 messages need to be retrieved privately against T 1 colluding servers, and all the messages need to be retrieved privately a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Different types of privacy can be considered for PLT. In this work, we focus on the PLT problem under a strong notion of privacy, called joint privacy, which was also considered previously for PIR and PLC (see, e.g., [4], [18], [35], [36]). We refer to this problem as PLT with Joint Privacy, or JPLT for short.…”
Section: Introductionmentioning
confidence: 99%
“…Different types of privacy can be considered for PLT. In this work, we focus on the PLT problem under a strong notion of privacy, called joint privacy, which was also considered previously for PIR and PLC (see, e.g., [4], [18], [35], [36]). We refer to this problem as PLT with Joint Privacy, or JPLT for short.…”
Section: Introductionmentioning
confidence: 99%