Weakly-Private Information Retrieval

@article{Lin2019WeaklyPrivateIR,
  title={Weakly-Private Information Retrieval},
  author={Hsuan-Yin Lin and Siddhartha Kumar and E. Rosnes and A. G. I. Amat and Eitan Yaakobi},
  journal={2019 IEEE International Symposium on Information Theory (ISIT)},
  year={2019},
  pages={1257-1261}
}
  • Hsuan-Yin Lin, Siddhartha Kumar, +2 authors Eitan Yaakobi
  • Published 2019
  • Computer Science, Mathematics
  • 2019 IEEE International Symposium on Information Theory (ISIT)
  • Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years. While existing protocols strictly impose that no information is leaked on the file’s identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. In… CONTINUE READING
    10 Citations
    Asymmetric Leaky Private Information Retrieval
    • 3
    • Highly Influenced
    • PDF
    The Capacity of Single-Server Weakly-Private Information Retrieval
    • 2
    • PDF
    Weakly Private Information Retrieval Under the Maximal Leakage Metric
    • 3
    • Highly Influenced
    On the Capacity of Weakly-Private Information Retrieval
    • 2
    • Highly Influenced
    On the Information Leakage in Private Information Retrieval Systems
    • 13
    • PDF
    The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns
    • Xinyu Yao, Nan Liu, W. Kang
    • Computer Science, Mathematics
    • 2020 IEEE International Symposium on Information Theory (ISIT)
    • 2020
    • 3
    • PDF
    Capacity-Achieving Private Information Retrieval Codes from MDS-Coded Databases with Minimum Message Size
    • 21
    • PDF
    Capacity-Achieving Private Information Retrieval Codes From MDS-Coded Databases With Minimum Message Size
    • 2

    References

    SHOWING 1-10 OF 19 REFERENCES
    Private information retrieval with side information: The single server case
    • 30
    • PDF
    Codes for distributed PIR with low storage overhead
    • 90
    • PDF
    Private information retrieval
    • 1,178
    • PDF
    PIR with Low Storage Overhead: Coding instead of Replication
    • 57
    • PDF
    The Capacity of Private Information Retrieval
    • 151
    • PDF
    Private information retrieval from MDS coded data in distributed storage systems
    • 121
    • PDF
    Private information retrieval in distributed storage systems using an arbitrary linear code
    • 51
    • PDF
    Lower-Cost ∈-Private Information Retrieval
    • 21
    • PDF
    On the Access Complexity of PIR Schemes
    • 5
    • PDF
    Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval
    • 183
    • PDF