Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers

R Tajeddine, OW Gnilke, D Karpuk… - … on information theory, 2019 - ieeexplore.ieee.org
The problem of private information retrieval (PIR) from coded storage systems with colluding,
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …

The capacity of private information retrieval from heterogeneous uncoded caching databases

K Banawan, B Arasli, YP Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider private information retrieval (PIR) of a single file out of K files from N non-
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …

Private set intersection: A multi-message symmetric private information retrieval perspective

Z Wang, K Banawan, S Ulukus - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We study the problem of private set intersection (PSI). In this problem, there are two entities,
for, each storing a set, whose elements are picked from a finite set, on replicated and non …

Private polynomial computation from Lagrange encoding

N Raviv, DA Karpuk - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Private computation is a generalization of private information retrieval, in which a user is
able to compute a function on a distributed dataset without revealing the identity of that …

On the information leakage in private information retrieval systems

T Guo, R Zhou, C Tian - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We consider information leakage to the user in private information retrieval (PIR) systems.
Information leakage can be measured in terms of individual message leakage or total …

Efficient private federated submodel learning

S Vithana, S Ulukus - ICC 2022-IEEE International Conference …, 2022 - ieeexplore.ieee.org
We investigate the problem of private federated submodel learning, where a machine
learning model is divided into M submodels and stored in N databases, from which a given …

Multi-party private set intersection: An information-theoretic approach

Z Wang, K Banawan, S Ulukus - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
We investigate the problem of multi-party private set intersection (MP-PSI). In MP-PSI, there
are M parties, each storing a data set P i over N i replicated and non-colluding databases …

Private and secure distributed matrix multiplication schemes for replicated or MDS-coded servers

J Li, C Hollanti - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
In this paper, we study the problem of private and secure distributed matrix multiplication
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …

Private read update write (PRUW) in federated submodel learning (FSL): Communication efficient schemes with and without sparsification

S Vithana, S Ulukus - IEEE Transactions on Information theory, 2023 - ieeexplore.ieee.org
We investigate the problem of private read-update-write (PRUW) in relation to private
federated submodel learning (FSL), where a machine learning model is divided into multiple …