On the Asymptotic Capacity of X-Secure T-Private Information Retrieval with Graph Based Replicated Storage

04/11/2019
by   Zhuqing Jia, et al.
0

The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary T-privacy and X-security constraints, where the privacy of the user must be protected against any set of up to T colluding servers and the security of the stored data must be protected against any set of up to X colluding servers. A general achievable scheme for arbitrary storage patterns is presented that achieves the rate (ρ_-X-T)/N, where N is the total number of servers, and each message is replicated at least ρ_ times. Notably, the scheme makes use of a special structure inspired by dual Generalized Reed Solomon (GRS) codes. A general converse is also presented. The two bounds are shown to match for many settings, including symmetric storage patterns. Finally, the asymptotic capacity is fully characterized for the case without security constraints (X=0) for arbitrary storage patterns provided that each message is replicated no more than T+2 times. As an example of this result, consider PIR with arbitrary graph based storage (T=1, X=0) where every message is replicated at exactly 3 servers. For this 3-replicated storage setting, the asymptotic capacity is equal to 2/ν_2(G) where ν_2(G) is the maximum size of a 2-matching in a storage graph G[V,E]. In this undirected graph, the vertices V correspond to the set of servers, and there is an edge uv∈ E between vertices u,v only if a subset of messages is replicated at both servers u and v.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/13/2023

The Asymptotic Capacity of X-Secure T-Private Linear Computation with Graph Based Replicated Storage

The problem of X-secure T-private linear computation with graph based re...
research
08/22/2018

Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T-Private Information Retrieval

X-secure and T-private information retrieval (XSTPIR) is a form of priva...
research
08/09/2020

Double Blind T-Private Information Retrieval

Double blind T-private information retrieval (DB-TPIR) enables two users...
research
02/08/2022

Private Information Delivery with Coded Storage

In private information delivery (PID) problem, there are K messages stor...
research
11/13/2017

Private Function Retrieval

The widespread use of cloud computing services raises the question of ho...
research
10/16/2020

The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns

We study the symmetric private information retrieval (SPIR) problem unde...
research
12/04/2018

Private Information Retrieval in Graph Based Replication Systems

In a Private Information Retrieval (PIR) protocol, a user can download a...

Please sign up or login with your details

Forgot password? Click here to reset