: Sergey Yekhanin
: Locally Decodable Codes and Private Information Retrieval Schemes
: Springer-Verlag
: 9783642143588
: 1
: CHF 85.60
:
: Informatik
: English
: 82
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency - specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve records from public databases while completely hiding the identity of the retrieved records from database owners. In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes, obtaining new families of each which have much better parameters than those of previously known constructions, and he also proves limitations of two server PIRs in a restricted setting that covers all currently known schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.
Preface6
Acknowledgments8
Contents9
1 Introduction11
1.1 Locally decodable codes11
1.1.1 Hadamard code12
1.1.2 A code based on polynomial interpolation13
1.2 Private information retrieval schemes14
1.2.1 A PIR scheme based on polynomial interpolation15
1.3 The history of LDCs and PIR schemes16
1.3.1 The first generation: interpolation17
1.3.2 The second generation: recursion18
1.3.3 The third generation: point removal19
1.3.4 Lower bounds22
1.4 Applications of LDCs and PIR schemes23
1.4.1 Secure multiparty computation23
1.4.2 Other models of private information retrieval24
1.4.3 Average-case complexity26
1.5 Organization of the book26
1.6 Addendum27
2 Locally decodable codes via the point removal method28
2.1 Notation28
2.2 Locally decodable codes29
2.3 Binary LDCs via point removal29
2.3.1 Regular intersecting families of sets30
2.3.2 Basic construction31
2.3.3 The main construction: point removal33
2.4 General LDCs via point removal35
2.5 Combinatorially nice subsets of Fp*39
2.6 Algebraically nice subsets of Fp*41
2.6.1 3-dependences between p-th roots: sufficient conditions43
2.6.2 k-dependences between p-th roots: a sufficient condition44
2.6.3 Summary48
2.7 Results48
2.7.1 Results for three-query binary codes49
2.7.2 Results for general codes50
2.8 Addendum51
2.8.1 The code53
3 Limitations of the point removal method55
3.1 Attaining subexponential length requires a nice sequence55
3.1.1 Point removal method55
3.1.2 Point removal and bounds for P(rt-1)56
3.1.3 Our results56
3.2 A nice sequence yields short dependences between p-th roots57
3.2.1 Algebraically nice subsets of Fq*58
3.2.2 Combinatorially nice subsets of Fq*61
3.2.3 Summary63
3.3 k-dependences between p-th roots: a necessary condition64
3.4 3-dependences between p-th roots: a necessary condition65
3.5 Summary66
3.6 Conclusions67
3.7 Addendum67
4 Private information retrieval68
4.1 Preliminaries68
4.2 From LDCs to PIR schemes69
4.2.1 Upper bounds for three-server binary PIR schemes71
4.2.2 Upper bounds for general PIR schemes72
4.3 A combinatorial view of two-server PIR73
4.3.1 Bilinear PIR76
4.3.2 Group-based PIR76
4.4 Complexity of bilinear group-based PIR77
4.4.1 Algebraic preliminaries77
4.4.2 Algebraic formulation78
4.4.3 Low-dimensional principal ideals in group algebras79
4.5 Summary of lower bounds for two-server PIR80
4.6 Addendum81
References82
Index87