On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers

03/29/2019
by   Lukas Holzbaur, et al.
0

In this work, we first prove the capacity of coded, linear symmetric private information retrieval (SPIR) in the presence of colluding, adversarial, and nonresponsive servers, giving a positive closure to the conjecture stated by Tajeddine et al. It is also shown that, further restricting to strongly-linear PIR schemes with linear interference cancellation, the so-called star product scheme proposed by Freij-Hollanti et al. is optimal. This observation enables to prove the capacity of strongly-linear (non-symmetric) PIR schemes for any number of files. Further, it also provides a positive proof in this practical special case for the conjectures stated in the asymptotic regime by Freij-Hollanti et al. and Tajeddine et al.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/28/2021

On the Capacity of Quantum Private Information Retrieval from MDS-Coded and Colluding Servers

In quantum private information retrieval (QPIR), a user retrieves a clas...
research
02/11/2018

Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers

A private information retrieval (PIR) scheme on coded storage systems wi...
research
02/04/2021

High-Rate Quantum Private Information Retrieval with Weakly Self-Dual Star Product Codes

In the classical private information retrieval (PIR) setup, a user wants...
research
07/07/2022

Star Product PIR Schemes with Colluding Servers over Small Fields

Private Information Retrieval (PIR) was first proposed by B. Chor, O. Go...
research
06/01/2018

Private Streaming with Convolutional Codes

Recently, information-theoretic private information retrieval (PIR) from...
research
09/11/2018

The ε-error Capacity of Symmetric PIR with Byzantine Adversaries

The capacity of symmetric private information retrieval with K messages,...
research
06/22/2018

Staircase-PIR: Universally Robust Private Information Retrieval

We consider the problem of designing private information retrieval (PIR)...

Please sign up or login with your details

Forgot password? Click here to reset