Communication-Efficient Private Information Acquisition: Multicasting via Crowding
نویسندگان
چکیده
This paper focuses on the way to protect privacy of clients requesting datasets stored in data servers while keeping communication efficiency. To this end, we introduce a novel communication-efficient and protecting framework termed crowded information acquisition (CIA) , well suited large number scenario. We investigate CIA under various conditions addressing possible scenarios. Contrary conventional belief, results claim that demanding private services can enhance protection providing low latency generating small amount traffic.
منابع مشابه
Efficient and Optimal Selling Mechanisms with Private Information Acquisition Costs∗
In auctions with private information acquisition costs, we completely characterize efficient and optimal two-stage selling mechanisms, with the first stage being the pre-screening or entry right allocation mechanism, and the second stage being the traditional private good provision mechanism. Both efficiency and optimality require the second stage mechanism to be ex post efficient. For the firs...
متن کاملEfficient and optimal mechanisms with private information acquisition costs
In auctions with private information acquisition costs, we completely characterize (socially) efficient and (revenue) optimal two-stage mechanisms, with the first stage being an entry right allocation mechanism and the second stage being a traditional private good provision mechanism. Both efficiency and revenue optimality require that the second-stage selling mechanism be ex post efficient and...
متن کاملEfficient Private Information Retrieval
Informally, private information retrieval for k >= 1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about ...
متن کاملInformation Acquisition and Crowding Out in Regulatory Hierarchies
This paper studies an externality common to all policy setting hierarchies in which information acquisition is essential to making policy decisions. The paper analyses the regulation of a monopolist with unknown cost both by a state and a federal agency with overlapping jurisdictions. When the objectives of the two tiers in the regulatory hierarchy differ, and the federal agency relies at least...
متن کاملPrivate Branching Programs: On Communication-Efficient Cryptocomputing
We polish a recent cryptocomputing method of Ishai and Paskin from TCC 2007. More precisely, we show that every function can be cryptocomputed in communication, linear in the product of client’s input length and the length of the branching program, and computation, linear in the size of the branching program that computes it. The method is based on the existence of a communication-efficient (2,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Vehicular Technology
سال: 2021
ISSN: ['0018-9545', '1939-9359']
DOI: https://doi.org/10.1109/tvt.2021.3083603