A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files stored in a database without revealing any information about the identity of the requested file. Existing information-theoretic PIR proto- cols ensure perfect privacy, i.e., zero information leakage to the servers storing the database, but at the cost of high download. In this work, we present weakly-private information retrieval (WPIR) schemes that trade off perfect privacy to improve the download cost when the database is stored on a single server. We study the tradeoff between the download cost and information leakage in terms of mutual information (MI) and maximal leak- age (MaxL) privacy metrics. By relating the WPIR problem to rate-dis...
Multi-server single-message private information retrieval is studied in the presence of side informa...
This paper introduces a generalization of the Private Information Retrieval with Side Information (P...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Weakly-private information retrieval (WPIR) is a variant of the private information retrieval proble...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
The problem of weakly-private information retrieval, is a variant of private informationretrieval, w...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract—Private information retrieval (PIR) systems allow a user to retrieve a record from a public...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
A private information retrieval (PIR) scheme is a mechanism that allows a user to retrieve any one o...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Consider Private Information Retrieval (PIR), where a client wants to retrieve one file out of $K$ f...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Multi-server single-message private information retrieval is studied in the presence of side informa...
This paper introduces a generalization of the Private Information Retrieval with Side Information (P...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Weakly-private information retrieval (WPIR) is a variant of the private information retrieval proble...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
The problem of weakly-private information retrieval, is a variant of private informationretrieval, w...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract—Private information retrieval (PIR) systems allow a user to retrieve a record from a public...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
A private information retrieval (PIR) scheme is a mechanism that allows a user to retrieve any one o...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Consider Private Information Retrieval (PIR), where a client wants to retrieve one file out of $K$ f...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Multi-server single-message private information retrieval is studied in the presence of side informa...
This paper introduces a generalization of the Private Information Retrieval with Side Information (P...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...