Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers

R Tajeddine, OW Gnilke, D Karpuk… - … on information theory, 2019 - ieeexplore.ieee.org
The problem of private information retrieval (PIR) from coded storage systems with colluding,
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …

The capacity of private information retrieval from uncoded storage constrained databases

MA Attia, D Kumar, R Tandon - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Private information retrieval (PIR) allows a user to retrieve a desired message from a set of
databases without revealing the identity of the desired message. The replicated database …

Asymmetric leaky private information retrieval

I Samy, M Attia, R Tandon… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

Noisy private information retrieval: On separability of channel coding and information retrieval

K Banawan, S Ulukus - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
We consider the problem of noisy private information retrieval (NPIR) from non-
communicating databases, each storing the same set of messages. In this model, the …

The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

Staircase-PIR: Universally robust private information retrieval

R Bitar, S El Rouayheb - 2018 IEEE Information Theory …, 2018 - ieeexplore.ieee.org
We consider the problem of designing private information retrieval (PIR) schemes on data of
m files replicated on n servers that can possibly collude. We focus on devising robust PIR …

Private sequential function computation

B Tahmasebi, MA Maddah-Ali - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
In this paper, we introduce the problem of private sequential function computation, where a
user wishes to compute a composition of a sequence of K linear functions, in a specific …

The capacity of multi-round private information retrieval from byzantine databases

X Yao, N Liu, W Kang - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
In this work, we investigate the capacity of private information retrieval (PIR) from N
replicated databases, where a subset of the databases are byzantine. We allow for multi …

The capacity of private information retrieval under arbitrary collusion patterns

X Yao, N Liu, W Kang - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find its capacity, which is the same as the capacity of the original …