14 research outputs found

    The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases

    Full text link
    We consider the private information retrieval (PIR) problem from decentralized uncoded caching databases. There are two phases in our problem setting, a caching phase, and a retrieval phase. In the caching phase, a data center containing all the KK files, where each file is of size LL bits, and several databases with storage size constraint μKL\mu K L bits exist in the system. Each database independently chooses μKL\mu K L bits out of the total KLKL bits from the data center to cache through the same probability distribution in a decentralized manner. In the retrieval phase, a user (retriever) accesses NN databases in addition to the data center, and wishes to retrieve a desired file privately. We characterize the optimal normalized download cost to be DL=∑n=1N+1(Nn−1)μn−1(1−μ)N+1−n(1+1n+⋯+1nK−1)\frac{D}{L} = \sum_{n=1}^{N+1} \binom{N}{n-1} \mu^{n-1} (1-\mu)^{N+1-n} \left( 1+ \frac{1}{n} + \dots+ \frac{1}{n^{K-1}} \right). We show that uniform and random caching scheme which is originally proposed for decentralized coded caching by Maddah-Ali and Niesen, along with Sun and Jafar retrieval scheme which is originally proposed for PIR from replicated databases surprisingly result in the lowest normalized download cost. This is the decentralized counterpart of the recent result of Attia, Kumar and Tandon for the centralized case. The converse proof contains several ingredients such as interference lower bound, induction lemma, replacing queries and answering string random variables with the content of distributed databases, the nature of decentralized uncoded caching databases, and bit marginalization of joint caching distributions.Comment: Submitted for publication, November 201

    WELLNESS PRACTICES’ CONTRIBUTION TO SOCIAL SUSTAINABILITY: A REVIEW OF THE LITERATURE

    Get PDF
    Despite being emphasized as one of the main pillars of global sustainable development, social sustainability has been vastly neglected in research, and its importance has been undervalued. This paper aims to highlight the important role that wellness practices play in enhancing social sustainability by uplifting individuals and progressing communities. In turn, social sustainability strengthens the circular economy, resulting in global sustainable development. The paper also raises questions about future sustainable communities, quality of life, and wellness programs, which open up new avenues for future research and implications

    Double Blind TT-Private Information Retrieval

    Full text link
    Double blind TT-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index (θ1,θ2\theta_1, \theta_2, resp.), to efficiently retrieve a message W(θ1,θ2)W(\theta_1,\theta_2) labeled by the two indices, from a set of NN servers that store all messages W(k1,k2),k1∈{1,2,⋯ ,K1},k2∈{1,2,⋯ ,K2}W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}, such that the two users' indices are kept private from any set of up to T1,T2T_1,T_2 colluding servers, respectively, as well as from each other. A DB-TPIR scheme based on cross-subspace alignment is proposed in this paper, and shown to be capacity-achieving in the asymptotic setting of large number of messages and bounded latency. The scheme is then extended to MM-way blind XX-secure TT-private information retrieval (MB-XS-TPIR) with multiple (MM) indices, each belonging to a different user, arbitrary privacy levels for each index (T1,T2,⋯ ,TMT_1, T_2,\cdots, T_M), and arbitrary level of security (XX) of data storage, so that the message W(θ1,θ2,⋯ ,θM)W(\theta_1,\theta_2,\cdots, \theta_M) can be efficiently retrieved while the stored data is held secure against collusion among up to XX colluding servers, the mthm^{th} user's index is private against collusion among up to TmT_m servers, and each user's index θm\theta_m is private from all other users. The general scheme relies on a tensor-product based extension of cross-subspace alignment and retrieves 1−(X+T1+⋯+TM)/N1-(X+T_1+\cdots+T_M)/N bits of desired message per bit of download.Comment: Accepted for publication in IEEE Journal on Selected Areas in Information Theory (JSAIT
    corecore