4.7 Article

Multi-User Blind Symmetric Private Information Retrieval From Coded Servers

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Symmetric Private Polynomial Computation From Lagrange Encoding

Jinbao Zhu et al.

Summary: This paper studies the problem of X-secure T-colluding symmetric Private Polynomial Computation (PPC) in a coded storage system with Byzantine and unresponsive servers. It proposes a novel symmetric PPC scheme using Lagrange encoding, which achieves efficient computation while ensuring security.

IEEE TRANSACTIONS ON INFORMATION THEORY (2022)

Article Computer Science, Information Systems

X-Secure T-Private Federated Submodel Learning With Elastic Dropout Resilience

Zhuqing Jia et al.

Summary: Motivated by the interest in federated submodel learning, this work tackles the problem of privately reading from and writing to a distributed database. The ACSA-RW scheme is proposed as an adaptive solution that maintains privacy, allows for elastic dropout resilience, and improves both private-read and private-write performance.

IEEE TRANSACTIONS ON INFORMATION THEORY (2022)

Article Engineering, Electrical & Electronic

Improved Constructions for Secure Multi-Party Batch Matrix Multiplication

Jinbao Zhu et al.

Summary: This study introduces a novel computation strategy for solving the Secure Multi-party Batch Matrix Multiplication problem, focusing on the trade-off between recovery threshold, system cost, and system complexity. Compared to existing results, the strategy performs better in terms of recovery threshold, amount of common randomness, download cost, and decoding complexity when a certain critical parameter is below a threshold, while other performance measures remain the same.

IEEE TRANSACTIONS ON COMMUNICATIONS (2021)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns for Replicated Databases

Xinyu Yao et al.

Summary: The study explores private information retrieval in replicated databases under arbitrary collusion patterns, deriving a general characterization of the PIR capacity. An achievable scheme is proposed where databases are non-uniformly queried based on the collusion pattern, with a converse proof applying Shearer's lemma to a linear combination of inequalities. Interestingly, the achievability and converse proofs involve dual linear programming problems, ultimately characterizing the PIR problem capacity under arbitrary collusion patterns.

IEEE TRANSACTIONS ON INFORMATION THEORY (2021)

Article Telecommunications

Secure Batch Matrix Multiplication From Grouping Lagrange Encoding

Jinbao Zhu et al.

Summary: This study focuses on the problem of distributed Secure Batch Matrix Multiplication (SBMM) and presents a computation strategy to characterize the trade-off between recovery threshold, system cost and system complexity, based on grouping Lagrange encoding.

IEEE COMMUNICATIONS LETTERS (2021)

Article Computer Science, Information Systems

Capacity-Achieving Private Information Retrieval Schemes From Uncoded Storage Constrained Servers With Low Sub-Packetization

Jinbao Zhu et al.

Summary: This study investigates reducing sub-packetization in uncoded SC-PIR systems, introducing the concept of Storage Design Array (SDA) and optimizing sub-packetization for improved efficiency.

IEEE TRANSACTIONS ON INFORMATION THEORY (2021)

Article Computer Science, Information Systems

On the Optimal Recovery Threshold of Coded Matrix Multiplication

Sanghamitra Dutta et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding

Qian Yu et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

Private Information Retrieval With Side Information

Swanand Kadhe et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

The Asymptotic Capacity of Private Search

Zhen Chen et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

The Capacity of T-Private Information Retrieval With Private Side Information

Zhen Chen et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

Capacity-Achieving Private Information Retrieval Codes From MDS-Coded Databases With Minimum Message Size

Ruida Zhou et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage

Zhuqing Jia et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers

Zhuqing Jia et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Proceedings Paper Computer Science, Theory & Methods

Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the Cubic Barrier

Qian Yu et al.

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases

Mohamed Adel Attia et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Theory & Methods

Private Polynomial Computation From Lagrange Encoding

Netanel Raviv et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

A New Capacity-Achieving Private Information Retrieval Scheme With (Almost) Optimal File Length for Coded Servers

Jinbao Zhu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

The Capacity of Symmetric Private Information Retrieval

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

Karim Banawan et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers

Qiwen Wang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Optimal Sub-Packetization of Linear Capacity-Achieving PIR Schemes With Colluding Servers

Zhifang Zhang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Computation

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers

Razane Tajeddine et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T -Private Information Retrieval

Zhuqing Jia et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Symmetric Private Information Retrieval from MDS Coded Distributed Storage With Non-Colluding and Colluding Servers

Qiwen Wang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Capacity-Achieving Private Information Retrieval Codes With Optimal Message Size and Upload Cost

Chao Tian et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval With Partially Known Private Side Information

Yi-Peng Wei et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Proceedings Paper Computer Science, Information Systems

Symmetric Private Information Retrieval with Mismatched Coded Messages and Randomness

Qiwen Wang et al.

2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2019)

Article Computer Science, Theory & Methods

Private Information Retrieval for Secure Distributed Storage Systems

Heecheol Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes

Karim Banawan et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Multiround Private Information Retrieval: Capacity and Storage Overhead

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Private Information Retrieval From MDS Coded Data in Distributed Storage Systems

Razane Tajeddine et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

The Capacity of Robust Private Information Retrieval With Colluding Databases

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval From Coded Databases

Karim Banawan et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Theory & Methods

Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Article Mathematics, Applied

Private Information Retrieval from Coded Databases with Colluding Servers

Ragnar Freij-Hollanti et al.

SIAM JOURNAL ON APPLIED ALGEBRA AND GEOMETRY (2017)

Article Engineering, Electrical & Electronic

Secure Degrees of Freedom of Wireless X Networks Using Artificial Noise Alignment

Zhao Wang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2015)

Article Engineering, Electrical & Electronic

A Survey on Network Codes for Distributed Storage

Alexandros G. Dimakis et al.

PROCEEDINGS OF THE IEEE (2011)

Article Computer Science, Information Systems

Network Coding for Distributed Storage Systems

Alexandros G. Dimakis et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2010)

Article Computer Science, Hardware & Architecture

General constructions for information-theoretic private information retrieval

A Beimel et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2005)