Bounds on the Capacity of PIR over Graphs

05/17/2021
by   Bar Sadeh, et al.
0

In the private information retrieval (PIR) problem, a user wants to retrieve a file from a database without revealing any information about the desired file's identity to the servers that store the database. In this paper, we study the PIR capacity of a graph-based replication system, in which each file is stored on two distinct servers according to an underlying graph. This paper aims to provide upper and lower bounds to the PIR capacity of graphs via various graph properties. In particular, we provide several upper bounds on the PIR capacity that apply to all graphs. We further improve the bounds for specific graph families (which turn out to be tight in certain cases) by utilizing the underlying graph structure. For the lower bounds, we establish optimal rate PIR retrieval schemes for star graphs via edge-coloring techniques. Lastly, we provide an improved PIR scheme for complete graphs, which implies an improved general lower bound on all graphs' PIR capacity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/04/2018

Private Information Retrieval in Graph Based Replication Systems

In a Private Information Retrieval (PIR) protocol, a user can download a...
research
01/13/2020

Capacity of Quantum Private Information Retrieval with Colluding Servers

Quantum private information retrieval (QPIR) is a protocol that a user r...
research
01/13/2021

Two-Level Private Information Retrieval

In the conventional robust T-colluding private information retrieval (PI...
research
02/26/2020

Trapping problem on star-type graphs with applications

The trapping problem on graph (or network) as a typical focus of great i...
research
03/17/2021

Capacity Achieving Uncoded PIR Protocol based on Combinatorial Designs

In this paper we study the problem of private information retrieval wher...
research
01/20/2019

Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrie...
research
10/04/2018

On the Inner Product Predicate and a Generalization of Matching Vector Families

Motivated by cryptographic applications such as predicate encryption, we...

Please sign up or login with your details

Forgot password? Click here to reset