Advancements in Privacy-Preserving Data Retrieval and Coding Theory

The field of information theory and coding is currently experiencing significant advancements, particularly in the areas of privacy-preserving data retrieval, error correction, and distributed storage systems. A notable trend is the development of novel schemes and codes that enhance privacy and efficiency in data retrieval and storage. These include advancements in private information retrieval (PIR) protocols, which now consider more practical scenarios such as wireless channels and relaxed privacy constraints to achieve higher rates. Additionally, there is a growing focus on optimizing codes for specific error correction tasks, such as phased burst errors, and on improving the efficiency of distributed storage systems through innovative coding schemes.

Another key area of progress is in the design of privacy mechanisms that balance the trade-off between data utility and privacy. Information-theoretic approaches are being refined to offer simpler, more efficient solutions to privacy mechanism design, leveraging concepts from information geometry to approximate and solve complex optimization problems.

In the realm of coding theory, researchers are exploring new classes of linear codes with few weights, which have applications in secret sharing and authentication codes. The determination of complete weight distributions for various spaces and the investigation of relationships between different types of perfect codes are also contributing to a deeper understanding of coding structures.

Noteworthy Papers

  • The Distributed Multi-User Point Function: Introduces a novel multi-user scheme ensuring correctness and privacy, with a characterization of capacity bounds.
  • Optimal Functional $2^{s-1}$-Batch Codes: Presents sufficient conditions for understanding and finding optimal solutions to functional batch codes.
  • Sun-Jafar-Type Schemes for Weak Private Information Retrieval: Offers new WPIR protocols with explicit rate-privacy trade-offs, advancing the state of the art in PIR.
  • PIR Over Wireless Channels: Achieving Privacy With Public Responses: Proposes a joint wiretap-PIR coding scheme for public wireless channels, addressing a significant gap in PIR research.
  • An Information Geometric Approach to Local Information Privacy: Simplifies privacy mechanism design with low-complexity solutions based on information geometry.
  • Bounds and Codes for General Phased Burst Errors: Provides a fine-grained approach to correcting phased burst errors, with implications for memory and storage systems.
  • A Linear Programming Approach to Private Information Retrieval: Introduces an algorithmic framework for constructing efficient AB-PIR schemes using linear programming.
  • Optimizing Leaky Private Information Retrieval Codes: Demonstrates a significant improvement in L-PIR schemes, achieving a lower leakage ratio exponent.
  • CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication: Presents novel polynomial codes for PDMM, outperforming existing schemes in certain scenarios.
  • Lower Bounds on the Sub-Packetization of Optimal-Access MSR Codes: Establishes new lower bounds for MSR codes, enhancing the understanding of multiple-node repair scenarios.

Sources

The Distributed Multi-User Point Function

Optimal Functional $2^{s-1}$-Batch Codes: Exploring New Sufficient Conditions

Several classes of linear codes with few weights derived from Weil sums

Sun-Jafar-Type Schemes for Weak Private Information Retrieval

PIR Over Wireless Channels: Achieving Privacy With Public Responses

An Information Geometric Approach to Local Information Privacy with Applications to Max-lift and Local Differential Privacy

Weight Distribution of the Weighted Coordinates Poset Block Space and Singleton Bound

Bounds and Codes for General Phased Burst Errors

A Linear Programming Approach to Private Information Retrieval

Optimizing Leaky Private Information Retrieval Codes to Achieve ${O}(\log K)$ Leakage Ratio Exponent

CAT and DOG: Improved Codes for Private Distributed Matrix Multiplication

Lower Bounds on the Sub-Packetization of Optimal-Access MSR Codes for Multiple-Node Repair

Built with on top of