arXiv Analytics

Sign in

arXiv:2501.11505 [cs.IT]AbstractReferencesReviewsResources

Sun-Jafar-Type Schemes for Weak Private Information Retrieval

Chandan Anand, Jayesh Seshadri, Prasad Krishnan, Gowtham R. Kurri

Published 2025-01-20Version 1

In information-theoretic private information retrieval (PIR), a client wants to retrieve one desired file out of $M$ files, stored across $N$ servers, while keeping the index of the desired file private from each $T$-sized subset of servers. A PIR protocol must ideally maximize the rate, which is the ratio of the file size to the total quantum of the download from the servers, while ensuring such privacy. In Weak-PIR (WPIR), the criterion of perfect information-theoretic privacy is relaxed. This enables higher rates to be achieved, while some information about the desired file index leaks to the servers. This leakage is captured by various known privacy metrics. By leveraging the well-established capacity-achieving schemes of Sun and Jafar under non-colluding ($T=1$) and colluding ($1<T\leq N$) scenarios, we present WPIR protocols for these scenarios. We also present a new WPIR scheme for the MDS scenario, by building upon the scheme by Banawan and Ulukus for this scenario. We present corresponding explicit rate-privacy trade-offs for these setups, under the mutual-information and the maximal leakage privacy metrics. In the collusion-free setup, our presented rate-privacy trade-off under maximal leakage matches that of the previous state of the art. With respect to the MDS scenario under the maximal leakage metric, we compare with the non-explicit trade-off in the literature, and show that our scheme performs better for some numerical examples. For the $T$-collusion setup (under both privacy metrics) and for the MDS setup under the mutual information metric, our rate-privacy trade-offs are the first in the literature, to the best of our knowledge.

Related articles: Most relevant | Search more
arXiv:2004.08035 [cs.IT] (Published 2020-04-17)
A Case for Maximal Leakage as a Side Channel Leakage Metric
arXiv:1912.01439 [cs.IT] (Published 2019-12-01)
Generalization Error Bounds Via Rényi-, $f$-Divergences and Maximal Leakage
arXiv:1111.3567 [cs.IT] (Published 2011-11-15, updated 2012-11-13)
On the Measurement of Privacy as an Attacker's Estimation Error