We consider private information retrieval (PIR) for distributed storage systems with noncolluding nodes where data is stored using a non maximum distance separable (MDS) linear code. Recently, it was shown that when data is stored using certain non-MDS codes, the MDS-PIR capacity can be achieved, and is indeed the capacity of the system. In this paper, for storage codes not belonging to this class, we present a heuristic algorithm for their decomposition into punctured subcodes and a PIR protocol based on these punctured subcodes. The code decomposition is guided by the generalized Hamming weights of the storage code. We show that the proposed PIR protocol can achieve a larger PIR rate than that of all existing PIR protocols
International audienceA private information retrieval (PIR) scheme allows a user to retrieve a file ...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and...
We propose a private information retrieval (PIR) protocol for distributed storage systems (DSSs) wit...
We consider private information retrieval (PIR) for distributed storage systems (DSSs) with noncollu...
We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs...
The problem of providing privacy, in the private information retrieval (PIR) sense, to users request...
We are living in the age of information where our lives are shaped by information and communication ...
We propose an information-theoretic private information retrieval (PIR) scheme for distributed stora...
Private information retrieval (PIR) schemes (with or without colluding servers) have been proposed f...
A Private Information Retrieval (PIR) scheme allows users to retrieve data from a database without d...
Error-control codes, which are being extensively used in communication systems, have found themselve...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
A private information retrieval (PIR) scheme allows a user to retrieve a file from a database withou...
International audienceA private information retrieval (PIR) scheme allows a user to retrieve a file ...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and...
We propose a private information retrieval (PIR) protocol for distributed storage systems (DSSs) wit...
We consider private information retrieval (PIR) for distributed storage systems (DSSs) with noncollu...
We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs...
The problem of providing privacy, in the private information retrieval (PIR) sense, to users request...
We are living in the age of information where our lives are shaped by information and communication ...
We propose an information-theoretic private information retrieval (PIR) scheme for distributed stora...
Private information retrieval (PIR) schemes (with or without colluding servers) have been proposed f...
A Private Information Retrieval (PIR) scheme allows users to retrieve data from a database without d...
Error-control codes, which are being extensively used in communication systems, have found themselve...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
A private information retrieval (PIR) scheme allows a user to retrieve a file from a database withou...
International audienceA private information retrieval (PIR) scheme allows a user to retrieve a file ...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and...