Back to Search Start Over

On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers.

Authors :
Wang, Qiwen
Skoglund, Mikael
Source :
IEEE Transactions on Information Theory; May2019, Vol. 65 Issue 5, p3183-3197, 15p
Publication Year :
2019

Abstract

We consider the problem of private information retrieval (PIR) and symmetric private information retrieval (SPIR) from replicated databases with colluding servers, in the presence of Byzantine adversaries and eavesdroppers. Specifically, there are $K$ messages replicatively stored at $N$ databases. A user wants to retrieve one message by communicating with the databases, without revealing the identity of the message retrieved. For $T$ -colluding databases, any $T$ out of $N$ databases may communicate their interactions with the user to guess the identity of the requested message. We consider the situation where the communication system can be vulnerable to attachers, namely, there is an adversary in the system that can tap in on or even try to corrupt the communication. The capacity is defined as the maximum number of information bits of the desired message retrieved per downloaded bit. For SPIR, it is further required that the user learns nothing about the other $K-1$ messages in the database. Three types of adversaries are considered: a Byzantine adversary who can overwrite the transmission of any $B$ servers to the user; a passive eavesdropper who can tap in on the incoming and outgoing transmissions of any $E$ servers; and a combination of both -- an adversary who can tap in on a set of any $E$ nodes, and overwrite the transmission of a set of any $B$ nodes. The problems of SPIR with colluding servers and the three types of adversaries are named T-BSPIR, T-ESPIR and T-BESPIR, respectively. We derive the capacities of the three secure SPIR problems. The results resemble those of secure network coding problems with adversaries and eavesdroppers. The capacity of $T$ -colluding PIR with Byzantine adversaries is characterized in. In this work, we consider $T$ -colluding PIR with an eavedropper (named T-EPIR). We derive the T-EPIR capacity when $E \geq T$ ; for the case where $E \leq T$ , we find an outer bound (converse bound) and an inner bound (achievability) on the optimal achievable rate. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00189448
Volume :
65
Issue :
5
Database :
Complementary Index
Journal :
IEEE Transactions on Information Theory
Publication Type :
Academic Journal
Accession number :
136101280
Full Text :
https://doi.org/10.1109/TIT.2018.2878034