Abstract

Private information retrieval (PIR) schemes allow a user to retrieve entries of a database without revealing the index of the desired item. The focus of this paper lies on constructions of PIR schemes with optimal computational complexity for the servers, which play a crucial part in fast retrieval. This paper first proposes a generic construction of t-private PIR schemes using circulant permutation matrices (CPMs), which can protect the user’s perfect privacy from any collusion of up to t servers. Then this paper takes Byzantine and unresponsive servers into account in the t-private PIR schemes using CPMs and proposes a generic construction of t-private robust PIR schemes using CPMs. The proposed constructions of PIR schemes enjoy the advantages of optimal computational complexity for the servers, competitive user computational complexity, acceptable communication complexity, low memory space for storing all possible queries for the user, and low encoding complexity upon encoding the database.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.