On the information leakage in private information retrieval systems
We consider information leakage to the user in private information retrieval (PIR) systems.
Information leakage can be measured in terms of individual message leakage or total …
Information leakage can be measured in terms of individual message leakage or total …
Asymmetric leaky private information retrieval
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …
been investigated under a variety of scenarios. Symmetric private information retrieval …
A capacity result on weakly-private information retrieval
S Chen, H Jia, Z Jia - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
The problem of weakly-private information retrieval (WPIR) is to allow the user to retrieve
one out of K messages from a set of N distributed servers while guaranteeing that the …
one out of K messages from a set of N distributed servers while guaranteeing that the …
Weakly private information retrieval from heterogeneously trusted servers
We study the problem of weakly private information retrieval (PIR) when there is
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric. A user …
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric. A user …
Weakly private information retrieval under the maximal leakage metric
In the canonical private information retrieval (PIR) problem, a user retrieves a message from
a set of databases without allowing any individual database to obtain any knowledge …
a set of databases without allowing any individual database to obtain any knowledge …
Improved weakly private information retrieval codes
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …
Weakly Private Information Retrieval from Heterogeneously Trusted Servers
We study the problem of weakly private information retrieval (PIR) when there is
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric and mutual …
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric and mutual …
[書籍][B] Cross Subspace Alignment and Its Applications to Private Information Retrieval and Coded Distributed Computation
Z Jia - 2021 - search.proquest.com
Originating from the construction of the asymptotic-capacity achieving scheme for X-secure T-
private information retrieval (XSTPIR), the technique of cross-subspace alignment (CSA) …
private information retrieval (XSTPIR), the technique of cross-subspace alignment (CSA) …
[PDF][PDF] Asymmetric Leaky Private Information Retrieval
ISMAR Tandon, L Lazos - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …
been investigated under a variety of scenarios. Symmetric private information retrieval …