On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage
From MaRDI portal
Publication:5138809
Abstract: The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary -privacy and -security constraints, where the privacy of the user must be protected against any set of up to colluding servers and the security of the stored data must be protected against any set of up to colluding servers. A general achievable scheme for arbitrary storage patterns is presented that achieves the rate , where is the total number of servers, and each message is replicated at least times. Notably, the scheme makes use of a special structure inspired by dual Generalized Reed Solomon (GRS) codes. A general converse is also presented. The two bounds are shown to match for many settings, including symmetric storage patterns. Finally, the asymptotic capacity is fully characterized for the case without security constraints for arbitrary storage patterns provided that each message is replicated no more than times. As an example of this result, consider PIR with arbitrary graph based storage () where every message is replicated at exactly servers. For this -replicated storage setting, the asymptotic capacity is equal to where is the maximum size of a -matching in a storage graph . In this undirected graph, the vertices correspond to the set of servers, and there is an edge between vertices only if a subset of messages is replicated at both servers and .
This page was built for publication: On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5138809)