Loading...
Search for: private-information-retrieval
0.007 seconds

    Private Information Retrieval for a Multi-Message Scenario with Private Side Information

    , Article IEEE Transactions on Communications ; Volume 69, Issue 5 , 2021 , Pages 3235-3244 ; 00906778 (ISSN) Siavoshani, M. J ; Shariatpanahi, S. P ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We consider the problem of private information retrieval (PIR), where a single user with private side information (PSI) aims to retrieve multiple files from a library stored at some servers. We assume that the side information (SI) at the user includes a subset of files stored privately. Moreover, the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load transmitted from the servers to the user such that the requested files can be decoded with the help of received data and side information. By providing matching lower and upper bounds for certain regimes, we characterize the minimum load imposed on all the... 

    Multi-message private information retrieval with private side information

    , Article 2018 IEEE Information Theory Workshop, ITW 2018, 25 November 2018 through 29 November 2018 ; 2019 ; 9781538635995 (ISBN) Shariatpanahi, S. P ; Jafari Siavoshani, M ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We consider the problem of private information retrieval (PIR) where a single user with private side information aims to retrieve multiple files from a library stored (uncoded) at a number of servers. We assume the side information at the user includes a subset of files stored privately (i.e., the server does not know the indices of these files). In addition, we require that the identity of requests and side information at the user are not revealed to any of the servers. The problem involves finding the minimum load to be transmitted from the servers to the user such that the requested files can be decoded with the help of received and side information. By providing matching lower and upper... 

    Private function computation

    , Article 2020 IEEE International Symposium on Information Theory, ISIT 2020, 21 July 2020 through 26 July 2020 ; Volume 2020-June , 2020 , Pages 1118-1123 Tahmasebi, B ; Maddah Ali, M. A ; IEEE Information Theory Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    In this paper, we study the problem of private function computation, where a user wants to compute a function of some inputs, using N in mathbb{N} servers, where the function is a private combination/composition of some K in mathbb{N} public basic functions {f 1 , f 2 ,., f K }. More precisely, for some inputs W m , m [1 : M], the user's goal is to calculate hleft( {{W-m}} ight) = sumolimits-{j = 1}^J {{alpha -j}} {h-j}left( {{W-m}} ight), for some J in mathbb{N}, some scalers α j , j [1 : J], and some functions h j (.), j [1 : J], where each is an arbitrary compositions of the basic functions {f 1 , f 2 ,., f K }. The computation is done through a sequence of queries to N servers. In each... 

    Privacy Preserving Communication Schemes for Light Clients in Blockchain Networks: Algorithms and Analysis

    , M.Sc. Thesis Sharif University of Technology Bakhshi, Mahdi (Author) ; Pakravan, Mohammad Reza (Supervisor) ; Maddah Ali, Mohammad Ali (Co-Supervisor)
    Abstract
    Lightweight clients are a type of blockchain users who do not store all the blocks in the blockchain due to limited resources. These users store only a small part of each block and when needed, request transactions from full nodes that store the entire blockchain. These users have no role in block validation and only want to receive transactions related to their addresses with proof of the inclusion in the block from full nodes.Since light clients rely on full nodes for receiving transactions, their privacy against full nodes is important. The current implementation of Bitcoin uses Bloom filters for privacy, but this offers very little privacy to the users.In this thesis, we study the... 

    -

    , Article 2018 Iran Workshop on Communication and Information Theory, IWCIT 2018, 25 April 2018 through 26 April 2018 ; 2018 , Pages 1-6 ; 9781538641491 (ISBN) Mirmohseni, M ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of electrical and electronics engineers Inc  2018
    Abstract
    The widespread use of cloud computing services raises the question of how one can delegate the processing tasks to the untrusted distributed parties without breaching the privacy of its data and algorithms. Motivated by the algorithm privacy concerns in a distributed computing system, in this paper, we introduce the private function retrieval (PFR) problem, where a user wishes to efficiently retrieve a linear function of K messages from N non-communicating replicated servers while keeping the function hidden from each individual server. The goal is to find a scheme with minimum communication cost. To characterize the fundamental limits of the communication cost, we define the capacity of PFR... 

    Private Inner product retrieval for distributed machine learning

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 355-359 ; 21578095 (ISSN); 9781538692912 (ISBN) Mousavi, M. H ; Maddah Ali, M. A ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we argue that in many basic algorithms for machine learning, including support vector machine (SVM) for classification, principal component analysis (PCA) for dimensionality reduction, and regression for dependency estimation, we need the inner products of the data samples, rather than the data samples themselves.Motivated by the above observation, we introduce the problem of private inner product retrieval for distributed machine learning, where we have a system including a database of some files, duplicated across some non-colluding servers. A user intends to retrieve a subset of specific size of the set of the inner product of every pair of data items in the database with...