Abstract

Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out of $K$ messages from $N$ non-communicating replicated databases (each holds all $K$ messages) while keeping the identity of the desired message index a secret from each individual database. The information theoretic capacity of PIR (equivalently, the reciprocal of minimum download cost) is the maximum number of bits of desired information that can be privately retrieved per bit of downloaded information. $T$-private PIR is a generalization of PIR to include the requirement that even if any $T$ of the $N$ databases collude, the identity of the retrieved message remains completely unknown to them. Robust PIR is another generalization that refers to the scenario where we have $M \geq N$ databases, out of which any $M - N$ may fail to respond. For $K$ messages and $M\geq N$ databases out of which at least some $N$ must respond, we show that the capacity of $T$-private and Robust PIR is $\left(1+T/N+T^2/N^2+\cdots+T^{K-1}/N^{K-1}\right)^{-1}$. The result includes as special cases the capacity of PIR without robustness ($M=N$) or $T$-privacy constraints ($T=1$).

Highlights

  • The private information retrieval (PIR) problem is motivated by the desire to protect the privacy of a user against data providers

  • In [25], we showed that the information theoretic capacity of PIR, for arbitrary number of messages K and arbitrary number of databases N is 1 + 1/N + 1/N 2 + · · · + 1/N K−1 −1

  • We characterize the capacity of robust T -private PIR with arbitrary number of messages, arbitrary number of databases, and arbitrary privacy level

Read more

Summary

Introduction

The private information retrieval (PIR) problem is motivated by the desire to protect the privacy of a user against data providers. There are several interesting extensions of PIR that explore its limitations under additional constraints These include extensions where up to T of the N databases may collude [26, 27] (T -private PIR); where some of the databases may not respond [28] (Robust PIR); where both the privacy of the user and the databases must be protected [1] (Symmetric PIR); where only one database holds all the messages and all other databases hold independent information [29]; where retrieval operations are unsynchronized [30]; and where beyond communications, computation is a concern [31]. We mainly consider T -private PIR in the Shannon theoretic setting, where we have an arbitrary number of messages (K), arbitrary number of databases (N ), each database stores all the messages, the messages are allowed to be arbitrarily large, and the privacy of the desired message index must be guaranteed even if any T of the N databases collude. The notation X ∼ Y is used to indicate that X and Y are identically distributed

T -private PIR
Robust T -private PIR
Main Result
Proof of Theorem 1
Query Structure
Specialization to Ensure Correctness and Privacy
Specialization
Proof of Theorem 2
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call