74
51

The Capacity of Private Information Retrieval with Eavesdroppers

Abstract

We consider the problem of private information retrieval (PIR) with colluding servers and eavesdroppers (abbreviated as ETPIR). The ETPIR problem is comprised of KK messages, NN servers where each server stores all KK messages, a user who wants to retrieve one of the KK messages without revealing the desired message index to any set of TT colluding servers, and an eavesdropper who can listen to the queries and answers of any EE servers but is prevented from learning any information about the messages. The information theoretic capacity of ETPIR is defined to be the maximum number of desired message symbols retrieved privately per information symbol downloaded. We show that the capacity of ETPIR is C=(1EN)(1+TENE++(TENE)K1)1C = \left( 1- \frac{E}{N} \right) \left(1 + \frac{T-E}{N-E} + \cdots + \left( \frac{T-E}{N-E} \right)^{K-1} \right)^{-1} when E<TE < T, and C=(1EN)C = \left( 1 - \frac{E}{N} \right) when ETE \geq T. To achieve the capacity, the servers need to share a common random variable (independent of the messages), and its size must be at least EN1C\frac{E}{N} \cdot \frac{1}{C} symbols per message symbol. Otherwise, with less amount of shared common randomness, ETPIR is not feasible and the capacity reduces to zero. An interesting observation is that the ETPIR capacity expression takes different forms in two regimes. When E<TE < T, the capacity equals the inverse of a sum of a geometric series with KK terms and decreases with KK; this form is typical for capacity expressions of PIR. When ETE \geq T, the capacity does not depend on KK, a typical form for capacity expressions of SPIR (symmetric PIR, which further requires data-privacy, {\it i.e.,} the user learns no information about other undesired messages); the capacity does not depend on TT either. In addition, the ETPIR capacity result includes multiple previous PIR and SPIR capacity results as special cases.

View on arXiv
Comments on this paper