On the information leakage in private information retrieval systems

T Guo, R Zhou, C Tian - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We consider information leakage to the user in private information retrieval (PIR) systems.
Information leakage can be measured in terms of individual message leakage or total …

Asymmetric leaky private information retrieval

I Samy, M Attia, R Tandon… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …

A capacity result on weakly-private information retrieval

S Chen, H Jia, Z Jia - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
The problem of weakly-private information retrieval (WPIR) is to allow the user to retrieve
one out of K messages from a set of N distributed servers while guaranteeing that the …

Weakly private information retrieval from heterogeneously trusted servers

YS Huang, W Zhao, R Zhou… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (PIR) when there is
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric. A user …

Weakly private information retrieval under the maximal leakage metric

R Zhou, T Guo, C Tian - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
In the canonical private information retrieval (PIR) problem, a user retrieves a message from
a set of databases without allowing any individual database to obtain any knowledge …

Improved weakly private information retrieval codes

C Qian, R Zhou, C Tian, T Liu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …

Weakly Private Information Retrieval from Heterogeneously Trusted Servers

W Zhao, YS Huang, R Zhou, C Tian - arxiv preprint arxiv:2402.17940, 2024 - arxiv.org
We study the problem of weakly private information retrieval (PIR) when there is
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric and mutual …

[書籍][B] Cross Subspace Alignment and Its Applications to Private Information Retrieval and Coded Distributed Computation

Z Jia - 2021 - search.proquest.com
Originating from the construction of the asymptotic-capacity achieving scheme for X-secure T-
private information retrieval (XSTPIR), the technique of cross-subspace alignment (CSA) …

[PDF][PDF] Asymmetric Leaky Private Information Retrieval

ISMAR Tandon, L Lazos - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …