Achieving Private Information Retrieval Capacity in Distributed Storage Using an Arbitrary Linear Code

12/11/2017
by   Siddhartha Kumar, et al.
0

We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs) where data is stored using an arbitrary linear code. The first two protocols, named Protocol 1 and Protocol 2, achieve privacy for the scenario with noncolluding nodes. Protocol 1 requires a file size that is exponential in the number of files in the system, while the file size required for Protocol 2 is independent of the number of files and is hence simpler. We prove that, for certain linear codes, Protocol 1 achieves the PIR capacity, i.e., its PIR rate (the ratio of the amount of retrieved stored data per unit of downloaded data) is the maximum possible for any given (finite and infinite) number of files, and Protocol 2 achieves the asymptotic PIR capacity (with infinitely large number of files in the DSS). In particular, we provide a sufficient and a necessary condition for a code to be PIR capacity-achieving and prove that cyclic codes, Reed-Muller (RM) codes, and optimal information locality local reconstruction codes achieve both the finite PIR capacity (i.e., with any given number of files) and the asymptotic PIR capacity with Protocols 1 and 2, respectively. Furthermore, we present a third protocol, Protocol 3, for the scenario with multiple colluding nodes, which can be seen as an improvement of a protocol recently introduced by Freij-Hollanti et al. We also present an algorithm to optimize the PIR rate of the proposed protocol. Finally, we provide a particular class of codes that is suitable for this protocol and show that RM codes achieve the maximum possible PIR rate for the protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/13/2018

A Capacity-Achieving PIR Protocol for Distributed Storage Using an Arbitrary Linear Code

We propose a private information retrieval (PIR) protocol for distribute...
research
09/04/2018

Private Information Retrieval From a Cellular Network With Caching at the Edge

We consider the problem of downloading content from a cellular network w...
research
03/17/2021

Capacity Achieving Uncoded PIR Protocol based on Combinatorial Designs

In this paper we study the problem of private information retrieval wher...
research
04/18/2019

Weighted Lifted Codes: Local Correctabilities and Application to Robust Private Information Retrieval

Low degree Reed-Muller codes are known to satisfy local decoding propert...
research
09/07/2020

Information Hiding Using Matroid Theory

Inspired by problems in Private Information Retrieval, we consider the s...
research
01/20/2022

Optimization of a Reed-Solomon code-based protocol against blockchain data availability attacks

ASBK (named after the authors' initials) is a recent blockchain protocol...
research
12/03/2018

QR code denoising using parallel Hopfield networks

We propose a novel algorithm for using Hopfield networks to denoise QR c...

Please sign up or login with your details

Forgot password? Click here to reset