TY - GEN
T1 - Weakly-Private Information Retrieval
AU - Lin, Hsuan Yin
AU - Kumar, Siddhartha
AU - Rosnes, Eirik
AU - Amat, Alexandre Graell I.
AU - Yaakobi, Eitan
N1 - Publisher Copyright: © 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years. While existing protocols strictly impose that no information is leaked on the file's identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. In case the user is willing to leak some information on the identity of the retrieved file, we study how the PIR rate, as well as the upload cost and access complexity, can be improved. For the particular case of replicated servers, we propose two weakly-private information retrieval schemes based on two recent PIR protocols and a family of schemes based on partitioning. Lastly, we compare the performance of the proposed schemes.
AB - Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years. While existing protocols strictly impose that no information is leaked on the file's identity, this work initiates the study of the tradeoffs that can be achieved by relaxing the requirement of perfect privacy. In case the user is willing to leak some information on the identity of the retrieved file, we study how the PIR rate, as well as the upload cost and access complexity, can be improved. For the particular case of replicated servers, we propose two weakly-private information retrieval schemes based on two recent PIR protocols and a family of schemes based on partitioning. Lastly, we compare the performance of the proposed schemes.
UR - http://www.scopus.com/inward/record.url?scp=85073163343&partnerID=8YFLogxK
U2 - 10.1109/ISIT.2019.8849444
DO - 10.1109/ISIT.2019.8849444
M3 - منشور من مؤتمر
T3 - IEEE International Symposium on Information Theory - Proceedings
SP - 1257
EP - 1261
BT - 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings
T2 - 2019 IEEE International Symposium on Information Theory, ISIT 2019
Y2 - 7 July 2019 through 12 July 2019
ER -