A Capacity Result on Weakly-Private Information Retrieval

被引:0
作者
Chen, Song [1 ]
Jia, Haobo [1 ]
Jia, Zhuqing [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Artificial Intelligence, Beijing, Peoples R China
来源
2024 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, ISIT 2024 | 2024年
基金
美国国家科学基金会;
关键词
Private information retrieval; privacy; capacity; ASYMPTOTIC CAPACITY;
D O I
10.1109/ISIT57864.2024.10619671
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problem of weakly-private information retrieval (WPIR) is to allow the user to retrieve one out of K messages from a set of N distributed servers while guaranteeing that the information about the identity of the index of the desired message is leaked to the servers in a controlled manner, i.e., the privacy level cannot be less than a prescribed threshold as measured by a privacy metric. In this work, we consider the converse-induced privacy metric (CIPM) for WPIR proposed by Jia and fully settle the capacity, i.e., the supremum of the average number of desired message symbols retrieved per downloaded symbol, for the arbitrary number of messages K and the number of servers N. Our achievability scheme makes use of a symmetrized (with respect to the servers) version of the PIR codes due to Tian et al. by carefully designing the query distributions. It turns out that the optimal trade-off between the privacy level and the reciprocal of the retrieval rate in terms of the CIPM metric is linear for non-degenerate settings.
引用
收藏
页码:2868 / 2873
页数:6
相关论文
共 45 条
[1]   Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) :4129-4149
[2]   Asymmetry Hurts: Private Information Retrieval Under Asymmetric Traffic Constraints [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) :7628-7645
[3]  
Banawan K, 2019, IEEE INT SYMP INFO, P1272, DOI [10.1109/isit.2019.8849399, 10.1109/ISIT.2019.8849399]
[4]   The Capacity of Private Information Retrieval from Byzantine and Colluding Databases [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (02) :1206-1219
[5]   Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (10) :6842-6862
[6]   The Capacity of Private Information Retrieval From Coded Databases [J].
Banawan, Karim ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) :1945-1956
[7]   The Capacity of T-Private Information Retrieval With Private Side Information [J].
Chen, Zhen ;
Wang, Zhiying ;
Jafar, Syed Ali .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (08) :4761-4773
[8]   Private Information Retrieval from Coded Databases with Colluding Servers [J].
Freij-Hollanti, Ragnar ;
Gnilke, Oliver W. ;
Hollanti, Camilla ;
Karpuk, David A. .
SIAM JOURNAL ON APPLIED ALGEBRA AND GEOMETRY, 2017, 1 (01) :647-664
[9]   An Operational Approach to Information Leakage [J].
Issa, Ibrahim ;
Wagner, Aaron B. ;
Kamath, Sudeep .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (03) :1625-1657
[10]  
Jia Haobo, 2023, 2023 IEEE International Symposium on Information Theory (ISIT), P1586, DOI 10.1109/ISIT54713.2023.10206837