Single-Server Private Information Retrieval Schemes are Equivalent to Locally Recoverable Coding Schemes

The Private Information Retrieval (PIR) problem has recently attracted a significant interest in the information-theory community. In this problem, a client wants to download one or more messages belonging to a database while protecting the identity of the downloaded message(s). In this article, we focus on the scenarios in which (i) the entire database is stored on a single server and (ii) the client has prior side information, namely a subset of messages unknown to the server. Such prior side information is necessary to enable efficient private information retrieval in the single server scenario. In the last decade, there has also been a significant interest in Locally Recoverable Codes (LRCs), a class of storage codes in which each symbol can be recovered from a limited number of other symbols. More recently, there is an interest in cooperative locally recoverable codes, i.e., codes in which multiple symbols can be recovered from a small set of other code symbols. The central problem in this context is given a set of code parameters to design an LRC scheme that includes a locally recoverable code along with encoding, decoding, and repair functions. The paper establishes an equivalence between the single-server PIR schemes and LRC schemes. In particular, we present explicit algorithms that transform a given PIR scheme into an LRC scheme and vice versa. We show that (i) PIR schemes for retrieving a single message are equivalent to classical LRC schemes; and (ii) PIR schemes for retrieving multiple messages are equivalent to cooperative LRC schemes. These equivalence results allow us to recover upper bounds on the download rate for PIR schemes, and to obtain a novel rate upper bound on cooperative LRC schemes. Our results cover schemes based on both linear and non-linear codes.

[1]  Sennur Ulukus,et al.  Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes , 2017, IEEE Transactions on Information Theory.

[2]  Cheng Huang,et al.  On the Locality of Codeword Symbols , 2011, IEEE Transactions on Information Theory.

[3]  Swanand Kadhe,et al.  Private information retrieval with side information: The single server case , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Sriram Vishwanath,et al.  Cooperative local repair in distributed storage , 2014, EURASIP Journal on Advances in Signal Processing.

[5]  Swanand Kadhe,et al.  On an Equivalence Between Single-Server PIR with Side Information and Locally Recoverable Codes , 2019, 2019 IEEE Information Theory Workshop (ITW).

[6]  Young-Han Kim,et al.  Fundamentals of Index Coding , 2018, Found. Trends Commun. Inf. Theory.

[7]  W. Marsden I and J , 2012 .

[8]  Shubhangi Saraf,et al.  Locally Decodable Codes , 2016, Encyclopedia of Algorithms.

[9]  Dimitris S. Papailiopoulos,et al.  Locally Repairable Codes , 2012, IEEE Transactions on Information Theory.

[10]  Zhifang Zhang,et al.  An Integer Programming-Based Bound for Locally Repairable Codes , 2014, IEEE Transactions on Information Theory.

[11]  Noga Alon,et al.  Broadcasting with Side Information , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[12]  Salim El Rouayheb,et al.  Robust private information retrieval on coded data , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[13]  Paul H. Siegel,et al.  Linear locally repairable codes with availability , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[14]  Paul H. Siegel,et al.  Binary Linear Locally Repairable Codes , 2015, IEEE Transactions on Information Theory.

[15]  Frédérique Oggier,et al.  Self-repairing homomorphic codes for distributed storage systems , 2010, 2011 Proceedings IEEE INFOCOM.

[16]  Alexandros G. Dimakis,et al.  Bounding multiple unicasts through index coding and Locally Repairable Codes , 2014, 2014 IEEE International Symposium on Information Theory.

[17]  Hua Sun,et al.  The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.

[18]  Sriram Vishwanath,et al.  Optimal Locally Repairable and Secure Codes for Distributed Storage Systems , 2012, IEEE Transactions on Information Theory.

[19]  Sriram Vishwanath,et al.  Cooperative local repair in distributed storage , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[20]  Swanand Kadhe,et al.  Private Information Retrieval With Side Information , 2017, IEEE Transactions on Information Theory.

[21]  Swanand Kadhe,et al.  On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  Rüdiger L. Urbanke,et al.  Modern Coding Theory , 2008 .

[23]  Michael Gastpar,et al.  Single-server Multi-message Private Information Retrieval with Side Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[24]  Ziv Bar-Yossef,et al.  Index Coding With Side Information , 2006, IEEE Transactions on Information Theory.

[25]  Travis Mayberry,et al.  PIRMAP: Efficient Private Information Retrieval for MapReduce , 2013, Financial Cryptography.

[26]  Luis Alfonso Lastras-Montaño,et al.  Reliable Memories with Subline Accesses , 2007, 2007 IEEE International Symposium on Information Theory.

[27]  Sriram Vishwanath,et al.  Optimal locally repairable codes via rank-metric codes , 2013, 2013 IEEE International Symposium on Information Theory.

[28]  Arya Mazumdar,et al.  Storage Capacity of Repairable Networks , 2014, IEEE Transactions on Information Theory.

[29]  Sennur Ulukus,et al.  The Capacity of Private Information Retrieval From Coded Databases , 2016, IEEE Transactions on Information Theory.

[30]  Itzhak Tamo,et al.  A Family of Optimal Locally Recoverable Codes , 2013, IEEE Transactions on Information Theory.

[31]  Hua Sun,et al.  The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.

[32]  Minghua Chen,et al.  Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[33]  Robert D. Kleinberg,et al.  Lexicographic Products and the Power of Non-linear Network Coding , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[34]  Arya Mazumdar,et al.  Bounds on the Size of Locally Recoverable Codes , 2015, IEEE Transactions on Information Theory.

[35]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.