24,087 Hits in 7.2 sec

t-Private Information Retrieval Schemes Using Transitive Codes [article]

Ragnar Freij-Hollanti, Oliver W. Gnilke, Camilla Hollanti, Anna-Lena Horlemann-Trautmann, David Karpuk, Ivo Kubjas
2017 arXiv   pre-print
This paper presents private information retrieval (PIR) schemes for coded storage with colluding servers, which are not restricted to maximum distance separable (MDS) codes.  ...  It is shown that codes with transitive automorphism groups yield the highest possible rates obtainable with the proposed scheme.  ...  Introduction to Private Information Retrieval from Coded Storage Let us describe the distributed storage systems we consider; this setup follows that of [8] , [9] , [13] .  ... 
arXiv:1712.02850v1 fatcat:qe3aokroercyjcp3rvapcrcici

Private Information Retrieval Schemes Using Cyclic Codes [article]

Şeyma Bodur, Edgar Martínez-Moro, Diego Ruano
2022 arXiv   pre-print
Reed-Muller codes were considered in [t-private information retrieval schemes using transitive codes, IEEE Trans. Inform. Theory, vol. 65, no. 4, pp. 2107-2118, 2019].  ...  A coded storage in a distributed storage system with colluding servers is considered in this work, namely the approach in [t-private information retrieval schemes using transitive codes, IEEE Trans.  ...  Hernando (Universitat Jaume I) for providing us the code of the algorithm in [9] .  ... 
arXiv:2111.09060v2 fatcat:k6pfwzxesvhvjlmdgron7wxk4q

Star Product PIR Schemes with Colluding Servers over Small Fields [article]

Hao Chen
2022 arXiv   pre-print
For MDS coded distributed storage system private information retrieval was proposed and the capacity of PIR schemes for MDS coded distributed storage was studied.  ...  Private Information Retrieval (PIR) was first proposed by B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan in their 1995 FOCS paper.  ...  Private information retrieval was proposed in [7, 8] .  ... 
arXiv:2207.03163v2 fatcat:cedtic2vuzabpjxtt7jzw3gi5m

Storage and Retrieval Codes in PIR Schemes with Colluding Servers [article]

Hao Chen, Liqing Xu
2022 arXiv   pre-print
Private information retrieval (PIR) schemes (with or without colluding servers) have been proposed for realistic coded distributed data storage systems.  ...  Therefore in the design of star product PIR schemes with colluding servers, the scheme with the storage code and the retrieval code in the same family of algebraic codes is not always efficient.  ...  Ruano for providing us the 2nd version of the paper [8] .  ... 
arXiv:2207.06087v4 fatcat:oseons42mnhbxc76guxwyvngqq

Table of contents

2019 IEEE Transactions on Information Theory  
Kubjas t-Private Information Retrieval Schemes Using Transitive Codes 2107 M. Tahmasbi and M. R. Bloch First-and Second-Order Asymptotics in Covert Communication 2190 G. Bassi, P. Piantanida, and S.  ...  Bruck On the Uncertainty of Information Retrieval in Associative Memories 2155 L. Jin and H. Kan Self-Dual Near MDS Codes from Elliptic Curves 2166 V. Guruswami and R.  ... 
doi:10.1109/tit.2019.2903372 fatcat:vqazvhbuk5cohbkpxula74g3ee

Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval [article]

Karim Banawan, Sennur Ulukus
2018 arXiv   pre-print
We use the achievable schemes for the PIR problem under asymmetric traffic constraints and random coding arguments to derive a general lower bound for the retrieval rate.  ...  Next, we consider the private information retrieval problem from multiple access channels (MAC-PIR).  ...  Private information retrieval (PIR), introduced by Chor et al.  ... 
arXiv:1807.05997v1 fatcat:nhfarf7gvjgcnbcwi5du7pnepm

ON-OFF Privacy with Correlated Requests [article]

Carolina Naim, Fangwei Ye, Salim El Rouayheb
2019 arXiv   pre-print
The problem is to design ON-OFF privacy schemes with maximum download rate that allow the user to obtain privately his requested messages.  ...  In this case, we propose an ON-OFF privacy scheme and prove its optimality.  ...  Ulukus, " The capacity of private information retrieval from coded databases," IEEE Transactions on Information Theory, vol. 64, no. 3, pp. 1945-1956, 2018.  ... 
arXiv:1905.00146v1 fatcat:xlns3rfeizeofbxfg4lsm2nbe4

Attribute-based Encryption for Fine-Grained Access Control on Secure Hybrid Clouds

Sridhar Reddy Vulapula, Srinivas Malladi
2020 International Journal of Advanced Computer Science and Applications  
In addition, the approach also addresses a method to effectively extract relevant information from hybrid clouds.  ...  A hybrid cloud is a mix of both private and public clouds proposed for the storage of health data. Carefully distributing data between private and public clouds to provide protection.  ...  Compared to the other protocols, the results inform us that the scheme has achieved better efficiency.  ... 
doi:10.14569/ijacsa.2020.0111047 fatcat:w5oqokj23jctpe4culdtcn6nmi

Securing dynamic itineraries for mobile agent applications

Carles Garrigues, Sergi Robles, Joan Borrell
2008 Journal of Network and Computer Applications  
By using trust strategically, our scheme provides a balanced trade-o between exibility and security.  ...  Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it.  ...  Rule ITIN protects the information of every node using rule NODE. Finally, rule NODE builds the expressions E r i (m i , t ij ), using rule TR to generate the transitions t ij .  ... 
doi:10.1016/j.jnca.2007.12.002 fatcat:puztofhvizaanh5vvrwckop2qi

Bounds on the Capacity of PIR over Graphs [article]

Bar Sadeh and Yujie Gu and Itzhak Tamo
2021 arXiv   pre-print
In the private information retrieval (PIR) problem, a user wants to retrieve a file from a database without revealing any information about the desired file's identity to the servers that store the database  ...  For the lower bounds, we establish optimal rate PIR retrieval schemes for star graphs via edge-coloring techniques.  ...  Introduction Private information retrieval (PIR), introduced by Chor et al.  ... 
arXiv:2105.07704v1 fatcat:vprzizerabasnptkx7twmd3vim

Enabling access-privacy for random walk based data analysis applications

Ping Lin, K. Selçuk Candan
2007 Data & Knowledge Engineering  
In particular, we show that if the underlying transition matrix is diagonalizable then we can compute the exact number of states needed for access-privacy, while if the matrix is non-diagonalizable, then  ...  Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing.  ...  Private information retrieval (PIR) [14] is a related scheme where a client can hide from an untrusted host the data item that it retrieves.  ... 
doi:10.1016/j.datak.2007.03.011 fatcat:lamxyvpvpnbt5dtfh2jxi3vy2i

A Syllable-Based Technique for Uyghur Text Compression

Wayit Abliz, Hao Wu, Maihemuti Maimaiti, Jiamila Wushouer, Kahaerjiang Abiderexiti, Tuergen Yibulayin, Aishan Wumaier
2020 Information  
The experiments showed that the 12-bit coding scheme had an average compression ratio of 0.3 on Uyghur text less than 4 KB in size and that the 16-bit coding scheme had an average compression ratio of  ...  First, according to the statistics of syllable coverage of the corpus text, we constructed a 12-bit and 16-bit syllable code tables and added commonly used symbols—such as punctuation marks and ASCII characters—to  ...  The B16 scheme using the Private Use Area contained 6400 code positions.  ... 
doi:10.3390/info11030172 doaj:7e8010d68511489a801b50c86837fe55 fatcat:xlb4wxoxmrax5bl5h3irtqfo5y

Revisiting the Computational Practicality of Private Information Retrieval [chapter]

Femi Olumofin, Ian Goldberg
2012 Lecture Notes in Computer Science  
However, keeping the search terms private or confidential without undermining the server's ability to retrieve the desired information is a problem that private information retrieval (PIR) schemes are  ...  Using analytical and experimental techniques, we find the end-to-end response times of these schemes to be one to three orders of magnitude (10-1000 times) smaller than the trivial scheme for realistic  ...  Private information retrieval (PIR) provides a means of retrieval that guarantees access privacy, by preventing the database administrator from being able to learn any information about which particular  ... 
doi:10.1007/978-3-642-27576-0_13 fatcat:b6n5u7ucingz5mkr7nhpygmn4q

Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR [article]

Jie Li, Camilla Hollanti, Oliver Gnilke
2021 arXiv   pre-print
For instance, other SDMM schemes as well as linear private information retrieval (PIR) as a special case of SDMM are instantly covered.  ...  While the present work exemplifies the proposed server cooperation in the case of a specific secure distributed matrix multiplication (SDMM) scheme, the same idea applies to many other use cases as well  ...  storage systems and private information retrieval.  ... 
arXiv:2106.05785v1 fatcat:lwnp5nhcavhwbldj7vhgpklliu

Supplementary_material – Supplemental material for Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy

Dave Archer, Michael A August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala (+7 others)
2020 Figshare  
Supplemental material, Supplementary_material for Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy by Dave Archer, Michael A  ...  August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra, Gerome  ...  For other operators, our re-writer retrieves necessary secret shared data from the relational store, and then issues byte-code programs that evaluate those operators over the retrieved data in SCALE.  ... 
doi:10.25384/sage.12999214.v1 fatcat:jfsg2ir6h5bx7dehrzxjakyw54
« Previous Showing results 1 — 15 out of 24,087 results