Two-Level Private Information Retrieval
نویسندگان
چکیده
In the conventional robust $T$ -colluding private information retrieval (PIR) system, user needs to retrieve one of possible messages while keeping identity requested message from any colluding servers. Motivated by heterogeneous privacy requirements for different messages, we consider notation="LaTeX">$(N, T_{1}~:~K_{1}, T_{2}~:~K_{2})$ two-level PIR system with a total notation="LaTeX">$K_{2}$ in where notation="LaTeX">$T_{1}\geq T_{2}$ and notation="LaTeX">$K_{1}\leq K_{2}$ . Any notation="LaTeX">$K_{1}$ be retrieved privately against notation="LaTeX">$T_{1}$ servers, full set notation="LaTeX">$T_{2}$ We obtain lower bound capacity proposing two novel coding schemes, namely non-uniform successive cancelation scheme block scheme. A upper is also derived. The gap between bounds analyzed, shown vanish when notation="LaTeX">$T_{1}=T_{2}$ Lastly, show that general not tight providing stronger special setting.
منابع مشابه
Efficient Private Information Retrieval
Informally, private information retrieval for k >= 1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about ...
متن کاملPractical Private Information Retrieval
In recent years, the subject of online privacy has been attracting much interest, especially as more Internet users than ever are beginning to care about the privacy of their online activities. Privacy concerns are even prompting legislators in some countries to demand from service providers a more privacy-friendly Internet experience for their citizens. These are welcomed developments and in s...
متن کاملNearly Private Information Retrieval
A private information retrieval scheme is a protocol whereby a client obtains a record from a database without the database operators learning anything about which record the client requested. This concept is well studied in the theoretical computer science literature. Here, we study a generalization of this idea where we allow a small amount of information about the client’s intent to be leake...
متن کاملThe Capacity of Private Information Retrieval with Private Side Information
The problem of private information retrieval with private side information (PIR-PSI) is recently introduced by Kadhe et al. In this problem, N replicated databases each store K messages, of which M are known to the user as side-information. The identity of these M messages is unknown to the databases. The user wishes to retrieve, as efficiently as possible, a new desired message without reveali...
متن کاملPrivate Information Retrieval with Partially Known Private Side Information
We consider the problem of private information retrieval (PIR) of a single message out of K messages from N replicated and non-colluding databases where a cache-enabled user of cache-size M messages possesses side information in the form of full messages that are partially known to the databases. In this model, the user and the databases engage in a two-phase scheme, namely, the prefetching pha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2022
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2022.3181216