Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers

03/29/2019
by   Seunghoan Song, et al.
0

Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum systems from non-communicating n servers each of which contains the copy of f files, while the identity of the retrieving file is unknown to each server. As an extension, we consider the colluded QPIR that the identity of the retrieving file is secret even if any n-1 servers collude, and derive the QPIR capacity for this problem which is defined as the maximum rate of the retrieving file size over the download size. For an even number n of servers, we show that the capacity of the colluded QPIR is 2/n, when we assume that there are preexisting entanglements among the servers and require that no information of the non-retrieving files is retrieved. We construct a colluded QPIR protocol of rate n/2^-1 and prove that the capacity is upper bounded by 2/n. The colluded QPIR capacity is strictly higher than the classical counterpart.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/25/2019

Capacity of Quantum Private Information Retrieval with Multiple Servers

We consider the capacity of quantum private information retrieval (QPIR)...
research
02/04/2023

k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size

We consider the problem of designing a Private Information Retrieval (PI...
research
03/17/2021

Capacity Achieving Uncoded PIR Protocol based on Combinatorial Designs

In this paper we study the problem of private information retrieval wher...
research
05/30/2018

Multi-Message Private Information Retrieval with Private Side Information

We consider the problem of private information retrieval (PIR) where a s...
research
08/23/2023

Private Information Retrieval with Private Noisy Side Information

Consider Private Information Retrieval (PIR), where a client wants to re...
research
02/17/2019

Private Inner Product Retrieval for Distributed Machine Learning

In this paper, we argue that in many basic algorithms for machine learni...
research
09/09/2022

Minimizing Information Leakage under Padding Constraints

An attacker can gain information of a user by analyzing its network traf...

Please sign up or login with your details

Forgot password? Click here to reset