Recently it was shown that the seminal Maddah-Ali and Niesen (MAN) coded caching scheme leaks the demand information of each user to the others. Many works have considered coded caching with demand privacy, while each non-trivial existing coded caching scheme with private demands was built on the fact that the cache information of each user is private to the others. However, most of these schemes leak the users' cache information. Consequently, in most realistic settings (e.g., video streaming), where the system is used over time with multiple sequential transmission rounds, these schemes leak demand privacy beyond the first round. This observation motivates our new formulation of coded caching with simultaneously private demands and caches...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Proceedings of: National Conference on Communications (NCC), 21-23 Feb. 2020, Kharagpur, India.The d...
We consider the problem of cache-aided multi-user private information retrieval (MuPIR). In this pro...
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which demonstrated the benefits...
This dissertation studies privacy and security problems from an information-theoretic point of view....
In this paper, we propose a scheme for the problem of cache-aided multi-user private information ret...
We consider private information retrieval (PIR) in a content delivery scenario where, to reduce the ...
We consider the demand-private coded caching problem in a noiseless broadcast network. It is known f...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
We consider the problem of downloading content from a cellular network that is cached at the wireles...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Proceedings of: National Conference on Communications (NCC), 21-23 Feb. 2020, Kharagpur, India.The d...
We consider the problem of cache-aided multi-user private information retrieval (MuPIR). In this pro...
Recent work by Maddah-Ali and Niesen (2014) introduced coded caching which demonstrated the benefits...
This dissertation studies privacy and security problems from an information-theoretic point of view....
In this paper, we propose a scheme for the problem of cache-aided multi-user private information ret...
We consider private information retrieval (PIR) in a content delivery scenario where, to reduce the ...
We consider the demand-private coded caching problem in a noiseless broadcast network. It is known f...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
We consider the problem of downloading content from a cellular network that is cached at the wireles...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...