PIR Over Wireless Channels: Achieving Privacy with Public Responses

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we address the problem of Private Information Retrieval (PIR) over a public Additive White Gaussian Noise (AWGN) channel. In this setting, a curious server - a passive adversary following the protocol but attempting to infer private information from intercepted transmissions - can eavesdrop on other servers' responses, compromising the user's privacy. Prior work on PIR over shared media typically assumed that servers could not overhear each other's transmissions. In contrast, we remove this assumption and consider a fully public channel. We propose a novel joint PIR-channel coding scheme based on nested lattice codes to meet the resulting privacy and reliability challenges. The scheme simultaneously addresses channel noise, ensures user privacy, and protects against curious servers. We demonstrate that a positive PIR rate is achievable even in cases where the channel to the curious server is stronger than the channel to the user.

Original languageEnglish
Title of host publicationISIT 2025 - 2025 IEEE International Symposium on Information Theory, Proceedings
PublisherInstitute of Electrical and Electronics Engineers
ISBN (Electronic)9798331543990
DOIs
StatePublished - 1 Jan 2025
Event2025 IEEE International Symposium on Information Theory, ISIT 2025 - Ann Arbor, United States
Duration: 22 Jun 202527 Jun 2025

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Conference

Conference2025 IEEE International Symposium on Information Theory, ISIT 2025
Country/TerritoryUnited States
CityAnn Arbor
Period22/06/2527/06/25

Keywords

  • AWGN MAC
  • Lattice Codes
  • Private Information Retrieval
  • Wiretap

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'PIR Over Wireless Channels: Achieving Privacy with Public Responses'. Together they form a unique fingerprint.

Cite this