Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($\theta_1, \theta_2$, resp.), to efficiently retrieve a message $W(\theta_1,\theta_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to $T_1,T_2$ colluding servers, respectively, as well as from each other. A DB-TPIR scheme based on cross-subspace alignment is proposed in this paper, and shown to be capacity-achieving in the asymptotic setting of large number of messages and bounded latency. The scheme is then extended to $M$-way blind $X$-secure $T$-private information...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A (K, N, T, Kc) instance of private information retrieval from MDS coded data with colluding servers...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies a...
$X$-secure and $T$-private information retrieval (XSTPIR) is a form of private information retrieval...
Originating from the construction of the asymptotic-capacity achieving scheme for X-secure T-private...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Blind interference alignment (BIA) refers to interference alignment schemes that are designed only b...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
The modern information age is heralded by exciting paradigms that generate a tremendous amount of da...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in thi...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A (K, N, T, Kc) instance of private information retrieval from MDS coded data with colluding servers...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies a...
$X$-secure and $T$-private information retrieval (XSTPIR) is a form of private information retrieval...
Originating from the construction of the asymptotic-capacity achieving scheme for X-secure T-private...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Blind interference alignment (BIA) refers to interference alignment schemes that are designed only b...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
The modern information age is heralded by exciting paradigms that generate a tremendous amount of da...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in thi...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
A (K, N, T, Kc) instance of private information retrieval from MDS coded data with colluding servers...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...