Multi-Server Weakly-Private Information Retrieval

نویسندگان

چکیده

Private information retrieval (PIR) protocols ensure that a user can download file from database without revealing any on the identity of requested to servers storing database. While existing strictly impose no is leaked file’s identity, this work initiates study tradeoffs be achieved by relaxing perfect privacy requirement. We refer such as weakly-private (WPIR) protocols. In particular, for case multiple noncolluding replicated servers, we how rate, upload cost, and access complexity improved when constraint. To quantify leakage consider mutual (MI), worst-case leakage, maximal (MaxL). present two WPIR schemes, denoted Scheme A B, based recent PIR show rate former optimized solving convex optimization problem. also achieves an compared recently proposed scheme Samy et al. under so-called $\epsilon $ -privacy metric. Additionally, family schemes partitioning presented. Moreover, provide information-theoretic converse bound maximum possible MI MaxL metrics practical restriction alphabet size queries answers. For files, tight metric, which settles capacity in particular case. Finally, compare performance their gap bound.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Private Information Retrieval

Informally, private information retrieval for k >= 1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about ...

متن کامل

Practical Private Information Retrieval

In recent years, the subject of online privacy has been attracting much interest, especially as more Internet users than ever are beginning to care about the privacy of their online activities. Privacy concerns are even prompting legislators in some countries to demand from service providers a more privacy-friendly Internet experience for their citizens. These are welcomed developments and in s...

متن کامل

Nearly Private Information Retrieval

A private information retrieval scheme is a protocol whereby a client obtains a record from a database without the database operators learning anything about which record the client requested. This concept is well studied in the theoretical computer science literature. Here, we study a generalization of this idea where we allow a small amount of information about the client’s intent to be leake...

متن کامل

Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval

We consider a setting where records containing sensitive personal information are stored on a remote database managed by a storage provider. Each record in the database is co-owned by a fixed number of parties called data-subjects. The paper proposes a protocol that allows data-subjects to grant access to their records, to self-approved parties, without the DB manager being able to learn if and...

متن کامل

Sublinear Scaling for Multi-Client Private Information Retrieval

Private information retrieval (PIR) allows clients to retrieve records from online database servers without revealing to the servers any information about what records are being retrieved. To achieve this, the servers must typically do a computation involving the entire database for each query. Previous work by Ishai et al. has suggested using batch codes to allow a single client (or collaborat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2022

ISSN: ['0018-9448', '1557-9654']

DOI: https://doi.org/10.1109/tit.2021.3126865