The Capacity of Single-Server Weakly-Private Information Retrieval

被引:13
作者
Lin, Hsuan-Yin [1 ]
Kumar, Siddhartha [1 ]
Rosnes, Eirik [1 ]
Graell i Amat, Alexandre [1 ,2 ]
Yaakobi, Eitan [3 ]
机构
[1] Simula UiB, N-5006 Bergen, Norway
[2] Chalmers Univ Technol, Dept Elect Engn, S-41296 Gothenburg, Sweden
[3] Technion Israel Inst Technol, Dept Comp Sci, IL-3200003 Haifa, Israel
来源
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY | 2021年 / 2卷 / 01期
基金
瑞典研究理事会; 以色列科学基金会;
关键词
Private information retrieval; capacity; information-theoretic privacy; information leakage; single server;
D O I
10.1109/JSAIT.2021.3056327
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A private information retrieval (PIR) protocol guarantees that a user can privately retrieve files stored in a database without revealing any information about the identity of the requested file. Existing information-theoretic PIR protocols ensure perfect privacy, i.e., zero information leakage to the servers storing the database, but at the cost of high download. In this work, we present weakly-private information retrieval (WPIR) schemes that trade off perfect privacy to improve the download cost when the database is stored on a single server. We study the tradeoff between the download cost and information leakage in terms of mutual information (MI) and maximal leakage (MaxL) privacy metrics. By relating the WPIR problem to rate-distortion theory, the download-leakage function, which is defined as the minimum required download cost of all single-server WPIR schemes for a given level of information leakage and a fixed file size, is introduced. By characterizing the download-leakage function for the MI and MaxL metrics, the capacity of single-server WPIR is fully described.
引用
收藏
页码:415 / 427
页数:13
相关论文
共 50 条
[1]  
Asonov D., 2002, 2002 ACM WORKSHOP PR, P32
[2]   The Capacity of Private Information Retrieval from Byzantine and Colluding Databases [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (02) :1206-1219
[3]   The Capacity of Private Information Retrieval From Coded Databases [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) :1945-1956
[4]   Information-theoretic Bounds for Differentially Private Mechanisms [J].
Barthe, Gilles ;
Koepf, Boris .
2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, :191-204
[5]  
Bhattad K., 2005, P INT S NETW COD NET
[6]  
Bloch M., 2011, Physical-Layer Security: From Information Theory to Security Engineering
[7]  
Chan TH, 2015, IEEE INT SYMP INFO, P2842, DOI 10.1109/ISIT.2015.7282975
[8]  
Chor B, 1995, AN S FDN CO, P41, DOI 10.1109/SFCS.1995.492461
[9]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[10]  
Cover T. M., 1999, Elements of Information Theory