TY - JOUR
T1 - Asymmetric Leaky Private Information Retrieval
AU - Samy, Islam
AU - Attia, Mohamed
AU - Tandon, Ravi
AU - Lazos, Loukas
N1 - Funding Information:
Manuscript received May 29, 2020; revised May 13, 2021; accepted May 18, 2021. Date of publication June 2, 2021; date of current version July 14, 2021. The work of Islam Samy and Loukas Lazos was supported by NSF under Grant CNS 1813401. The work of Mohamed Attia and Ravi Tandon was supported in part by NSF under Grant CAREER 1651492, Grant CNS 1715947, Grant CCF 2100013; and in part by the 2018 Keysight Early Career Professor Award. This article was presented in part at the 2019 IEEE International Symposium on Information Theory. (Corresponding author: Ravi Tandon.) The authors are with the Department of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ 85721 USA (e-mail: islamsamy@ email.arizona.edu; madel@email.arizona.edu; tandonr@email.arizona.edu; llazos@email.arizona.edu). Communicated by A. Beimel, Associate Editor for Cryptography.
Publisher Copyright:
© 1963-2012 IEEE.
PY - 2021/8
Y1 - 2021/8
N2 - Information-Theoretic formulations of the private information retrieval (PIR) problem have been investigated under a variety of scenarios. Symmetric private information retrieval (SPIR) is a variant where a user is able to privately retrieve one out of K messages from N non-colluding replicated databases without learning anything about the remaining K-1 messages. However, the goal of perfect privacy can be too taxing for certain applications. In this paper, we investigate if the information-Theoretic capacity of SPIR (equivalently, the inverse of the minimum download cost) can be increased by relaxing both user and DB privacy definitions. Such relaxation is relevant in applications where privacy can be traded for communication efficiency. We introduce and investigate the Asymmetric Leaky PIR (AL-PIR) model with different privacy leakage budgets in each direction. For user privacy leakage, we bound the probability ratios between all possible realizations of DB queries by a function of a non-negative constant. For DB privacy, we bound the mutual information between the undesired messages, the queries, and the answers, by a function of a non-negative constant. We propose a general AL-PIR scheme that achieves an upper bound on the optimal download cost for arbitrary and. We show that the optimal download cost of AL-PIR is upper-bounded as D 1+ 1 N-1-e NK-1-1 . Second, we obtain an information-Theoretic lower bound on the download cost as D 1+ 1 Ne-1-(Ne)K-1-1 . The gap analysis between the two bounds shows that our AL-PIR scheme is optimal when = 0, i.e., under perfect user privacy and it is optimal within a maximum multiplicative gap of N-e-N-1 for any 0 and 0.
AB - Information-Theoretic formulations of the private information retrieval (PIR) problem have been investigated under a variety of scenarios. Symmetric private information retrieval (SPIR) is a variant where a user is able to privately retrieve one out of K messages from N non-colluding replicated databases without learning anything about the remaining K-1 messages. However, the goal of perfect privacy can be too taxing for certain applications. In this paper, we investigate if the information-Theoretic capacity of SPIR (equivalently, the inverse of the minimum download cost) can be increased by relaxing both user and DB privacy definitions. Such relaxation is relevant in applications where privacy can be traded for communication efficiency. We introduce and investigate the Asymmetric Leaky PIR (AL-PIR) model with different privacy leakage budgets in each direction. For user privacy leakage, we bound the probability ratios between all possible realizations of DB queries by a function of a non-negative constant. For DB privacy, we bound the mutual information between the undesired messages, the queries, and the answers, by a function of a non-negative constant. We propose a general AL-PIR scheme that achieves an upper bound on the optimal download cost for arbitrary and. We show that the optimal download cost of AL-PIR is upper-bounded as D 1+ 1 N-1-e NK-1-1 . Second, we obtain an information-Theoretic lower bound on the download cost as D 1+ 1 Ne-1-(Ne)K-1-1 . The gap analysis between the two bounds shows that our AL-PIR scheme is optimal when = 0, i.e., under perfect user privacy and it is optimal within a maximum multiplicative gap of N-e-N-1 for any 0 and 0.
KW - Private information retrieval (PIR)
KW - data privacy
KW - leakage constraints
KW - symmetric PIR (SPIR)
UR - http://www.scopus.com/inward/record.url?scp=85107325461&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85107325461&partnerID=8YFLogxK
U2 - 10.1109/TIT.2021.3085363
DO - 10.1109/TIT.2021.3085363
M3 - Article
AN - SCOPUS:85107325461
VL - 67
SP - 5352
EP - 5369
JO - IRE Professional Group on Information Theory
JF - IRE Professional Group on Information Theory
SN - 0018-9448
IS - 8
M1 - 9445017
ER -