Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security

01/18/2018
by   Karim Banawan, et al.
0

We consider the problem of private information retrieval through wiretap channel II (PIR-WTC-II). In PIR-WTC-II, a user wants to retrieve a single message (file) privately out of M messages, which are stored in N replicated and non-communicating databases. An external eavesdropper observes a fraction μ_n (of its choice) of the traffic exchanged between the nth database and the user. In addition to the privacy constraint, the databases should encode the returned answer strings such that the eavesdropper learns absolutely nothing about the contents of the databases. We aim at characterizing the capacity of the PIR-WTC-II under the combined privacy and security constraints. We obtain a general upper bound for the problem in the form of a max-min optimization problem, which extends the converse proof of the PIR problem under asymmetric traffic constraints. We propose an achievability scheme that satisfies the security constraint by encoding a secret key, which is generated securely at each database, into an artificial noise vector using an MDS code. The user and the databases operate at one of the corner points of the achievable scheme for the PIR under asymmetric traffic constraints such that the retrieval rate is maximized under the imposed security constraint. The upper bound and the lower bound match for the case of M=2 and M=3 messages, for any N, and any μ=(μ_1, ..., μ_N).

READ FULL TEXT

page 25

page 26

page 39

page 40

research
01/09/2018

Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints

We consider the classical setting of private information retrieval (PIR)...
research
07/16/2018

Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval

We consider the problem of noisy private information retrieval (NPIR) fr...
research
05/09/2023

Asymmetric X-Secure T-Private Information Retrieval: More Databases is Not Always Better

We consider a special case of X-secure T-private information retrieval (...
research
06/04/2020

Asymmetric Leaky Private Information Retrieval

Information-theoretic formulations of the private information retrieval ...
research
05/16/2022

Digital Blind Box: Random Symmetric Private Information Retrieval

We introduce the problem of random symmetric private information retriev...
research
02/25/2021

Download Cost of Private Updating

We consider the problem of privately updating a message out of K message...
research
04/11/2021

ON-OFF Privacy Against Correlation Over Time

We consider the problem of ON-OFF privacy in which a user is interested ...

Please sign up or login with your details

Forgot password? Click here to reset