Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers
R Tajeddine, OW Gnilke, D Karpuk… - … on information theory, 2019 - ieeexplore.ieee.org
The problem of private information retrieval (PIR) from coded storage systems with colluding,
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …
Byzantine, and unresponsive servers is considered. An explicit scheme using an [n, k] Reed …
The capacity of private information retrieval from uncoded storage constrained databases
Private information retrieval (PIR) allows a user to retrieve a desired message from a set of
databases without revealing the identity of the desired message. The replicated database …
databases without revealing the identity of the desired message. The replicated database …
Asymmetric leaky private information retrieval
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …
been investigated under a variety of scenarios. Symmetric private information retrieval …
The capacity of private information retrieval under arbitrary collusion patterns for replicated databases
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …
replicated databases. We find a general characterization of the PIR capacity, which is the …
Noisy private information retrieval: On separability of channel coding and information retrieval
We consider the problem of noisy private information retrieval (NPIR) from non-
communicating databases, each storing the same set of messages. In this model, the …
communicating databases, each storing the same set of messages. In this model, the …
The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …
Staircase-PIR: Universally robust private information retrieval
R Bitar, S El Rouayheb - 2018 IEEE Information Theory …, 2018 - ieeexplore.ieee.org
We consider the problem of designing private information retrieval (PIR) schemes on data of
m files replicated on n servers that can possibly collude. We focus on devising robust PIR …
m files replicated on n servers that can possibly collude. We focus on devising robust PIR …
Private sequential function computation
B Tahmasebi, MA Maddah-Ali - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
In this paper, we introduce the problem of private sequential function computation, where a
user wishes to compute a composition of a sequence of K linear functions, in a specific …
user wishes to compute a composition of a sequence of K linear functions, in a specific …
The capacity of multi-round private information retrieval from byzantine databases
In this work, we investigate the capacity of private information retrieval (PIR) from N
replicated databases, where a subset of the databases are byzantine. We allow for multi …
replicated databases, where a subset of the databases are byzantine. We allow for multi …
The capacity of private information retrieval under arbitrary collusion patterns
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find its capacity, which is the same as the capacity of the original …
replicated databases. We find its capacity, which is the same as the capacity of the original …