{"title":"单服务器个人私有信息检索:一种组合方法","authors":"A. Heidarzadeh, A. Sprintson","doi":"10.1109/ITW48936.2021.9611358","DOIUrl":null,"url":null,"abstract":"This paper considers the problem of single-server Individually-Private Information Retrieval (IPIR). In this problem, a user wants to retrieve D messages belonging to a dataset of K messages stored on a single server. Initially, the user knows M other messages belonging to the dataset as side information, where the identities of these M messages are unknown to the server. The goal is to minimize the total amount of information that the user must download from the server while keeping the identity of each of the D desired messages individually private, i.e., the identity of every individual message wanted by the user must be protected. The capacity of IPIR, which is defined as the supremum of all achievable download rates, was previously characterized for D = 2, M = 1. However, the capacity was left open for all other values of D, M. In this work, we present a technique for the proof of converse, based on a novel combinatorial approach. Using this technique, we establish an upper bound on the capacity of IPIR for D = 2, M = 2. For this setting, we also propose a new IPIR scheme—based on a probabilistic partitioning of the messages, that achieves the capacity upper bound. We believe that our approach can be employed for proving the converse and designing optimal schemes for the general cases of the problem.","PeriodicalId":325229,"journal":{"name":"2021 IEEE Information Theory Workshop (ITW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Single-Server Individually-Private Information Retrieval: A Combinatorial Approach\",\"authors\":\"A. Heidarzadeh, A. Sprintson\",\"doi\":\"10.1109/ITW48936.2021.9611358\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the problem of single-server Individually-Private Information Retrieval (IPIR). In this problem, a user wants to retrieve D messages belonging to a dataset of K messages stored on a single server. Initially, the user knows M other messages belonging to the dataset as side information, where the identities of these M messages are unknown to the server. The goal is to minimize the total amount of information that the user must download from the server while keeping the identity of each of the D desired messages individually private, i.e., the identity of every individual message wanted by the user must be protected. The capacity of IPIR, which is defined as the supremum of all achievable download rates, was previously characterized for D = 2, M = 1. However, the capacity was left open for all other values of D, M. In this work, we present a technique for the proof of converse, based on a novel combinatorial approach. Using this technique, we establish an upper bound on the capacity of IPIR for D = 2, M = 2. For this setting, we also propose a new IPIR scheme—based on a probabilistic partitioning of the messages, that achieves the capacity upper bound. We believe that our approach can be employed for proving the converse and designing optimal schemes for the general cases of the problem.\",\"PeriodicalId\":325229,\"journal\":{\"name\":\"2021 IEEE Information Theory Workshop (ITW)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Information Theory Workshop (ITW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITW48936.2021.9611358\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW48936.2021.9611358","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
摘要
本文研究了单服务器个人隐私信息检索(IPIR)问题。在这个问题中,用户希望检索属于存储在单个服务器上的K个消息数据集的D条消息。最初,用户知道属于数据集的M个其他消息作为副信息,其中这M个消息的身份对于服务器是未知的。目标是尽量减少用户必须从服务器下载的信息总量,同时保持所需消息的每条身份的私密性,即必须保护用户所需的每条消息的身份。IPIR的容量被定义为所有可实现下载速率的最大值,以前的特征为D = 2, M = 1。然而,对于D, m的所有其他值,容量是开放的。在这项工作中,我们提出了一种基于一种新的组合方法的证明逆向的技术。利用这种方法,我们建立了D = 2, M = 2时IPIR容量的上界。对于这种设置,我们还提出了一种新的基于消息概率划分的IPIR方案,该方案实现了容量上限。我们相信我们的方法可以用来证明问题的一般情况下的逆命题和设计最优方案。
Single-Server Individually-Private Information Retrieval: A Combinatorial Approach
This paper considers the problem of single-server Individually-Private Information Retrieval (IPIR). In this problem, a user wants to retrieve D messages belonging to a dataset of K messages stored on a single server. Initially, the user knows M other messages belonging to the dataset as side information, where the identities of these M messages are unknown to the server. The goal is to minimize the total amount of information that the user must download from the server while keeping the identity of each of the D desired messages individually private, i.e., the identity of every individual message wanted by the user must be protected. The capacity of IPIR, which is defined as the supremum of all achievable download rates, was previously characterized for D = 2, M = 1. However, the capacity was left open for all other values of D, M. In this work, we present a technique for the proof of converse, based on a novel combinatorial approach. Using this technique, we establish an upper bound on the capacity of IPIR for D = 2, M = 2. For this setting, we also propose a new IPIR scheme—based on a probabilistic partitioning of the messages, that achieves the capacity upper bound. We believe that our approach can be employed for proving the converse and designing optimal schemes for the general cases of the problem.