Private Information Retrieval is Graph Based Replication Systems

Netanel Raviv, Itzhak Tamot

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations


Replication is prevalent in both theory and practice as a means for obtaining robustness in distributed storage systems. A system in which every data entry is stored on two separate servers gives rise to a graph structure in a natural way, and the combinatorial properties of this graph shed light on the possible features of the system. One possible feature of interest, that has recently gained renewed attention, is private information retrieval (PIR). A PIR protocol enables a user to obtain a data entry from a storage system without revealing the identity of the requested entry to sets of colluding servers. In this paper we suggest a simple PIR protocol for graph based replication systems, which guarantees perfect secrecy against any set of colluding servers that does not induce a cycle. Furthermore, it is shown that the secrecy deteriorates gracefully with the number of cycles in the colluding set, and that the upload complexity can be reduced for graphs of certain specialized structure.

Original languageEnglish
Title of host publication2018 IEEE International Symposium on Information Theory, ISIT 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages5
ISBN (Print)9781538647806
StatePublished - 15 Aug 2018
Event2018 IEEE International Symposium on Information Theory, ISIT 2018 - Vail, United States
Duration: 17 Jun 201822 Jun 2018

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095


Conference2018 IEEE International Symposium on Information Theory, ISIT 2018
Country/TerritoryUnited States


FundersFunder number
California Institute of Technology
Beijing Center for Mathematics and Information Interdisciplinary Sciences


    Dive into the research topics of 'Private Information Retrieval is Graph Based Replication Systems'. Together they form a unique fingerprint.

    Cite this