Multi-Server Weakly-Private Information Retrieval

07/17/2020
by   Hsuan-Yin Lin, et al.
0

Private information retrieval (PIR) protocols ensure that a user can download a file from a database without revealing any information on the identity of the requested file to the servers storing the database. While existing protocols strictly impose that no information is leaked on the file's identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the perfect privacy requirement. We refer to such protocols as weakly-private information retrieval (WPIR) protocols. In particular, for the case of multiple noncolluding replicated servers, we study how the download rate, the upload cost, and the access complexity can be improved when relaxing the full privacy constraint. To quantify the information leakage on the requested file's identity we consider mutual information (MI), worst-case information leakage, and maximal leakage (MaxL). We present two WPIR schemes based on two recent PIR protocols and show that the download rate of the former can be optimized by solving a convex optimization problem. Additionally, a family of schemes based on partitioning is presented. Moreover, we provide an information-theoretic converse bound for the maximum possible download rate for the MI and MaxL privacy metrics under a practical restriction on the alphabet size of queries and answers. For two servers and two files, the bound is tight under the MaxL metric, which settles the WPIR capacity in this particular case. Finally, we compare the performance of the proposed schemes and their gap to the converse bound.

READ FULL TEXT
research
01/20/2019

Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols make it possible to retrie...
research
01/23/2020

The Capacity of Single-Server Weakly-Private Information Retrieval

A private information retrieval (PIR) protocol guarantees that a user ca...
research
09/09/2022

Minimizing Information Leakage under Padding Constraints

An attacker can gain information of a user by analyzing its network traf...
research
12/07/2020

Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

We consider the problem of information retrieval from a dataset of files...
research
06/04/2020

Asymmetric Leaky Private Information Retrieval

Information-theoretic formulations of the private information retrieval ...
research
01/27/2023

Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

Private Information Retrieval (PIR) schemes allow a client to retrieve a...
research
11/09/2021

Optimal Rate-Distortion-Leakage Tradeoff for Single-Server Information Retrieval

Private information retrieval protocols guarantee that a user can privat...

Please sign up or login with your details

Forgot password? Click here to reset