Communication-Efficient Private Information Acquisition: Multicasting via Crowding

نویسندگان

چکیده

This paper focuses on the way to protect privacy of clients requesting datasets stored in data servers while keeping communication efficiency. To this end, we introduce a novel communication-efficient and protecting framework termed crowded information acquisition (CIA) , well suited large number scenario. We investigate CIA under various conditions addressing possible scenarios. Contrary conventional belief, results claim that demanding private services can enhance protection providing low latency generating small amount traffic.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient and Optimal Selling Mechanisms with Private Information Acquisition Costs∗

In auctions with private information acquisition costs, we completely characterize efficient and optimal two-stage selling mechanisms, with the first stage being the pre-screening or entry right allocation mechanism, and the second stage being the traditional private good provision mechanism. Both efficiency and optimality require the second stage mechanism to be ex post efficient. For the firs...

متن کامل

Efficient and optimal mechanisms with private information acquisition costs

In auctions with private information acquisition costs, we completely characterize (socially) efficient and (revenue) optimal two-stage mechanisms, with the first stage being an entry right allocation mechanism and the second stage being a traditional private good provision mechanism. Both efficiency and revenue optimality require that the second-stage selling mechanism be ex post efficient and...

متن کامل

Efficient Private Information Retrieval

Informally, private information retrieval for k >= 1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about ...

متن کامل

Information Acquisition and Crowding Out in Regulatory Hierarchies

This paper studies an externality common to all policy setting hierarchies in which information acquisition is essential to making policy decisions. The paper analyses the regulation of a monopolist with unknown cost both by a state and a federal agency with overlapping jurisdictions. When the objectives of the two tiers in the regulatory hierarchy differ, and the federal agency relies at least...

متن کامل

Private Branching Programs: On Communication-Efficient Cryptocomputing

We polish a recent cryptocomputing method of Ishai and Paskin from TCC 2007. More precisely, we show that every function can be cryptocomputed in communication, linear in the product of client’s input length and the length of the branching program, and computation, linear in the size of the branching program that computes it. The method is based on the existence of a communication-efficient (2,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Vehicular Technology

سال: 2021

ISSN: ['0018-9545', '1939-9359']

DOI: https://doi.org/10.1109/tvt.2021.3083603