Weakly-Private Information Retrieval

01/20/2019
by   Hsuan-Yin Lin, et al.
0

Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years. While existing protocols strictly impose that no information is leaked on the file's identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. In case the user is willing to leak some information on the identity of the retrieved file, we study how the PIR rate, as well as the upload cost and access complexity, can be improved. For the particular case of replicated servers, we propose two weakly-private information retrieval schemes based on two recent PIR protocols and a family of schemes based on partitioning. Lastly, we compare the performance of the proposed schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/17/2020

Multi-Server Weakly-Private Information Retrieval

Private information retrieval (PIR) protocols ensure that a user can dow...
research
01/27/2023

Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

Private Information Retrieval (PIR) schemes allow a client to retrieve a...
research
01/13/2020

Capacity of Quantum Private Information Retrieval with Colluding Servers

Quantum private information retrieval (QPIR) is a protocol that a user r...
research
12/04/2018

Private Information Retrieval in Graph Based Replication Systems

In a Private Information Retrieval (PIR) protocol, a user can download a...
research
12/07/2020

Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval

We consider the problem of information retrieval from a dataset of files...
research
08/27/2023

P3LI5: Practical and Confidential Lawful Interception on the 5G Core

Lawful Interception (LI) is a legal obligation of Communication Service ...
research
05/17/2021

Bounds on the Capacity of PIR over Graphs

In the private information retrieval (PIR) problem, a user wants to retr...

Please sign up or login with your details

Forgot password? Click here to reset