Weakly-Private Information Retrieval

@article{Lin2019WeaklyPrivateIR,
  title={Weakly-Private Information Retrieval},
  author={Hsuan-Yin Lin and Siddhartha Kumar and Eirik Rosnes and Alexandre Graell i Amat and Eitan Yaakobi},
  journal={2019 IEEE International Symposium on Information Theory (ISIT)},
  year={2019},
  pages={1257-1261}
}
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years. While existing protocols strictly impose that no information is leaked on the file’s identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. In… CONTINUE READING

Citations

Publications citing this paper.

On the Capacity of Weakly-Private Information Retrieval

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

Capacity-Achieving Private Information Retrieval Codes with Optimal Message Size and Upload Cost

  • ICC 2019 - 2019 IEEE International Conference on Communications (ICC)
  • 2018
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

On the Access Complexity of PIR Schemes

  • 2019 IEEE International Symposium on Information Theory (ISIT)
  • 2018
VIEW 1 EXCERPT

Private information retrieval with side information: The single server case

  • 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
  • 2017
VIEW 1 EXCERPT

The Capacity of Private Information Retrieval

  • 2016 IEEE Global Communications Conference (GLOBECOM)
  • 2016
VIEW 3 EXCERPTS