Lower Bound on the Redundancy of PIR Codes

نویسندگان

  • Sankeerth Rao
  • Alexander Vardy
چکیده

We prove that the redundancy of a k-server PIR code of dimension s is Ω( √ s) for all k > 3. This coincides with a known upper bound of O( √ s) on the redundancy of PIR codes. Moreover, for k = 3 and k = 4, we determine the lowest possible redundancy of k-server PIR codes exactly. Similar results were proved independently byMary Wootters using a different method. Given two binary vectors u = (u1, u2, . . . , un) and v = (v1, v2, . . . , vn), we define their product uv componentwise, namely uv def = (u1v1, u2v2, . . . , unvn) (1) where u1v1, u2v2, . . . , unvn are computed in GF(2). Note that the product operation in (1) distributes over addition in Fn 2 . Thus (1) turns the vector space F n 2 into an algebra An over F2. This algebra An is unital, associative, and commutative. Given a set X ⊆ Fn 2 , we define the square of X as the set of products of the elements in X. Explicitly, X is defined as follows: X def = { uv : u, v ∈ X and u 6= v } (2) The following lemmas follow straightforwardly from the definitions in (1) and (2), along with the fact thatAn is a commutative algebra. We let 〈X〉 denote the linear span over F2 of a set X ⊆ Fn 2 . Lemma 1. |X2| 6 |X| ( |X| − 1 ) /2. Proof. If |X| = r, then X consists of the ( 2 ) vectors uv = vu for some u 6= v in X. Some of these vectors may coincide. Lemma 2. Let u, v1, v2, v3 ∈ Fn 2 . If v1v2 + v1v3 + v2v3 = 0, then (u + v1)(u + v2) + (u + v2)(u + v3) + (u + v3)(u + v1) = u Proof. Follows by straightforward verification using distributivity and commutativity in An. We now show how the foregoing lemmas can be used to establish a bound on the redundancy of binary k-server PIR codes for k > 3. These codes are defined in [1,2] as follows. Definition1. Let ei denote the binary (column) vector with 1 in position i and zeros elsewhere. We say that an s × n binary matrix G has propertyPk if for all i ∈ [s], there exist k disjoint sets of columns of G that add up to ei. A matrix that has property Pk is also said to be a k-server PIR matrix. A binary linear code C of length n and dimension s is called a k-server PIR code if there exists a generator matrix G for C with property Pk. For much more on k-server PIR codes and their applications in reducing the storage overhead of private information retrieval, see [1,2]. In particular, it is shown in [2] that, given a k-server PIR code of length s + r and dimension s, the storage overhead of any linear k-server PIR protocol can be reduced from k to (s + r)/s. Moreover, for every fixed k, there exist k-server PIR codes whose rate (and, hence, storage overhead) approaches 1 as their dimension s grows. However, exactly how fast the resulting storage overhead tends to 1 as s → ∞ was heretofore unknown. For every fixed k, Fazeli, Vardy, and Yaakobi [1,2] construct k-server PIR codes with redundancy r bounded by r 6 k √ s (

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cold standby redundancy optimization for nonrepairable series-parallel systems: Erlang time to failure distribution

In modeling a cold standby redundancy allocation problem (RAP) with imperfect switching mechanism, deriving a closed form version of a system reliability is too difficult. A convenient lower bound on system reliability is proposed and this approximation is widely used as a part of objective function for a system reliability maximization problem in the literature. Considering this lower bound do...

متن کامل

A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers

Since the concept of locally decodable codes was introduced by Katz and Trevisan in 2000 [11], it is well-known that information theoretically secure private information retrieval schemes can be built using locally decodable codes [15]. In this paper, we construct a Byzantine robust PIR scheme using the multiplicity codes introduced by Kopparty et al. [12]. Our main contributions are on the one...

متن کامل

On Lower Bounds for the Redundancy of Optimal Codes

The problem of providing bounds on the redundancy of an optimal code for a discrete memoryless source in terms of the probability distribution of the source, has been extensively studied in the literature. The attention has mainly focused on binary codes for the case when the most or the least likely source letter probabilities are known. In this paper we analyze the relationships among tight l...

متن کامل

The Rényi redundancy of generalized Huffman codes

If optimality is measured by average codeword length, Huffman's algorithm gives optimal codes, and the redundancy can be measured as the difference between the average codeword length and Shannon's entropy. If the objective function is replaced by an exponentially weighted average, then a simple modification of Huffman's algorithm gives optimal codes. The redundancy can now be measured as the d...

متن کامل

Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets

Abstract. Linear batch codes and codes for private information retrieval (PIR) with a query size t and a restricted size r of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of t or r by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1605.01869  شماره 

صفحات  -

تاریخ انتشار 2016