On the Information Leakage in Private Information Retrieval Systems

被引:0
|
作者
Guo, Tao [1 ]
Zhou, Ruida [1 ]
Tian, Chao [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
关键词
CAPACITY;
D O I
10.1109/tifs.2020.2981282
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider information leakage to the user in private information retrieval (PIR) systems. Information leakage can be measured in terms of individual message leakage or total leakage. Individual message leakage, or simply individual leakage, is defined as the amount of information that the user can obtain on any individual message that is not being requested, and the total leakage is defined as the amount of information that the user can obtain about all the other messages except the one being requested. In this work, we characterize the tradeoff between the minimum download cost and the individual leakage, and that for the total leakage, respectively. Coding schemes are proposed to achieve these optimal tradeoffs, which are also shown to be optimal in terms of the message size. We further characterize the optimal tradeoff between the minimum amount of common randomness and the total leakage. Moreover, we show that under individual leakage, common randomness is in fact unnecessary when there are more than two messages.
引用
收藏
页码:1018 / 1023
页数:6
相关论文
共 50 条
  • [11] Private Information Retrieval in Graph Based Replication Systems
    Raviv, Netanel
    Tamo, Itzhak
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 1739 - 1743
  • [12] Authenticated private information retrieval
    Colombo, Simone
    Nikitin, Kirill
    Corrigan-Gibbs, Henry
    Wu, David J.
    Ford, Bryan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3835 - 3851
  • [13] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed A.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [14] Tutorial: Private Information Retrieval
    Henry, Ryan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2608 - 2612
  • [15] Efficient private information retrieval
    Itoh, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 11 - 20
  • [16] Nearly private information retrieval
    Chakrabarti, Amit
    Shubina, Anna
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 383 - +
  • [17] Noisy Private Information Retrieval
    Banawan, Karim
    Ulukus, Sennur
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 1694 - 1698
  • [18] Verifiable Private Information Retrieval
    Ben-David, Shany
    Kalai, Yael Tauman
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT III, 2022, 13749 : 3 - 32
  • [19] Committed Private Information Retrieval
    Cao, Quang
    Tran, Hong Yen
    Dau, Son Hoang
    Yi, Xun
    Viterbo, Emanuele
    Feng, Chen
    Huang, Yu-Chih
    Zhu, Jingge
    Kruglik, Stanislav
    Kiah, Han Mao
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 393 - 413
  • [20] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4075 - 4088