Converse Bounds for Sun-Jafar-type Weak Private Information Retrieval
By: Chandan Anand , Jayesh Seshadri , Prasad Krishnan and more
Potential Business Impact:
Makes secret data safe from spies better.
Building on the well-established capacity-achieving schemes of Sun-Jafar (for replicated storage) and the closely related scheme of Banawan-Ulukus (for MDS-coded setting), a recent work by Chandan et al. proposed new classes of weak private information retrieval (WPIR) schemes for the collusion-free (replication and MDS-coded) setting, as well as for the $T$-colluding scenario. In their work, Chandan et al. characterized the expressions for the rate-privacy trade-offs for these classes of WPIR schemes, under the mutual information leakage and maximal leakage metrics. Explicit achievable trade-offs for the same were also presented, which were shown to be competitive or better than prior WPIR schemes. However, the class-wise optimality of the reported trade-offs were unknown. In this work, we show that the explicit rate-privacy trade-offs reported for the Sun-Jafar-type schemes by Chandan et al. are optimal for the non-colluding and replicated setting. Furthermore, we prove the class-wise optimality for Banawan-Ulukus-type MDS-WPIR and Sun-Jafar-type $T$-colluding WPIR schemes, under threshold-constraints on the system parameters. When these threshold-constraints do not hold, we present counter-examples which show that even higher rates than those reported before can be achieved.
Similar Papers
Sun-Jafar-Type Schemes for Weak Private Information Retrieval
Information Theory
Lets you get files without servers knowing which one.
A Unified Framework for Constructing Information-Theoretic Private Information Retrieval
Cryptography and Security
Keeps your secrets safe when searching online.
A General Coding Framework for Adaptive Private Information Retrieval
Information Theory
Keeps secrets safe even with slow servers.