Private retrieval, computing, and learning: Recent progress and future challenges
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers
R Tajeddine, OW Gnilke, D Karpuk… - … on information theory, 2019 - ieeexplore.ieee.org
The problem of private information retrieval (PIR) from coded storage systems with colluding,
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …
The capacity of private information retrieval from heterogeneous uncoded caching databases
We consider private information retrieval (PIR) of a single file out of K files from N non-
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …
Private set intersection: A multi-message symmetric private information retrieval perspective
We study the problem of private set intersection (PSI). In this problem, there are two entities,
for, each storing a set, whose elements are picked from a finite set, on replicated and non …
for, each storing a set, whose elements are picked from a finite set, on replicated and non …
Private polynomial computation from Lagrange encoding
N Raviv, DA Karpuk - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Private computation is a generalization of private information retrieval, in which a user is
able to compute a function on a distributed dataset without revealing the identity of that …
able to compute a function on a distributed dataset without revealing the identity of that …
On the information leakage in private information retrieval systems
We consider information leakage to the user in private information retrieval (PIR) systems.
Information leakage can be measured in terms of individual message leakage or total …
Information leakage can be measured in terms of individual message leakage or total …
Efficient private federated submodel learning
We investigate the problem of private federated submodel learning, where a machine
learning model is divided into M submodels and stored in N databases, from which a given …
learning model is divided into M submodels and stored in N databases, from which a given …
Multi-party private set intersection: An information-theoretic approach
We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there
are M parties, each storing a data set P i over N i replicated and non-colluding databases …
are M parties, each storing a data set P i over N i replicated and non-colluding databases …
Private and secure distributed matrix multiplication schemes for replicated or MDS-coded servers
J Li, C Hollanti - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
In this paper, we study the problem of private and secure distributed matrix multiplication
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …
Private read update write (PRUW) in federated submodel learning (FSL): Communication efficient schemes with and without sparsification
We investigate the problem of private read-update-write (PRUW) in relation to private
federated submodel learning (FSL), where a machine learning model is divided into multiple …
federated submodel learning (FSL), where a machine learning model is divided into multiple …