首页> 外文期刊>IEEE Transactions on Information Theory >The Capacity of Private Information Retrieval from Byzantine and Colluding Databases
【24h】

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

机译:从拜占庭数据库和共谋数据库中检索私人信息的能力

获取原文
获取原文并翻译 | 示例

摘要

We consider the problem of single-round private information retrieval (PIR) from N replicated databases. We consider the case when B databases are outdated (unsynchronized), or even worse, adversarial (Byzantine), and therefore, can return incorrect answers. In the PIR problem with Byzantine databases (BPIR), a user wishes to retrieve a specific message from a set of M messages with zero-error, irrespective of the actions performed by the Byzantine databases. We consider the T-privacy constraint in this paper, where any T databases can collude, and exchange the queries submitted by the user. We derive the information-theoretic capacity of this problem, which is the maximum number of correct symbols that can be retrieved privately (under the T-privacy constraint) for every symbol of the downloaded data. We determine the exact BPIR capacity to be C = (N - 2B)/N . (1-T/(N - 2B))/(1-(T/(N 2B))(M)), if 2B + T < N. This capacity expression shows that the effect of Byzantine databases on the retrieval rate is equivalent to removing 2B databases from the system, with a penalty factor of (N - 2B)/N, which signifies that even though the number of databases needed for PIR is effectively N - 2B, the user still needs to access the entire N databases. The result shows that for the unsynchronized PIR problem, if the user does not have any knowledge about the fraction of the messages that are missynchronized, the single-round capacity is the same as the BPIR capacity. Our achievable scheme extends the optimal achievable scheme for the robust PIR (RPIR) problem to correct the errors introduced by the Byzantine databases as opposed to erasures in the RPIR problem. Our converse proof uses the idea of the cut- set bound in the network coding problem against adversarial nodes.
机译:我们考虑从N个复制的数据库进行单轮私人信息检索(PIR)的问题。我们考虑的情况是B数据库过时(不同步),甚至更糟糕的是对抗性(拜占庭式),因此可能返回错误的答案。在带有拜占庭数据库(BPIR)的PIR问题中,用户希望从零错误的M条消息集中检索特定消息,而与拜占庭数据库所执行的操作无关。我们在本文中考虑了T隐私约束,其中任何T数据库都可以串通,并交换用户提交的查询。我们得出此问题的信息理论能力,这是可以为下载数据的每个符号私下(在T-privacy约束下)检索到的正确符号的最大数量。我们确定确切的BPIR容量为C =(N-2B)/ N。如果2B + T

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号