Skip to main content

Showing 1–33 of 33 results for author: Gopi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00778  [pdf, ps, other

    math.CO cs.DM cs.IT

    Rigidity matroids and linear algebraic matroids with applications to matrix completion and tensor codes

    Authors: Joshua Brakensiek, Manik Dhar, Jiyang Gao, Sivakanth Gopi, Matt Larson

    Abstract: We establish a connection between problems studied in rigidity theory and matroids arising from linear algebraic constructions like tensor products and symmetric products. A special case of this correspondence identifies the problem of giving a description of the correctable erasure patterns in a maximally recoverable tensor code with the problem of describing bipartite rigid graphs or low-rank co… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    MSC Class: 94B05; 52C25; 05B35

  2. arXiv:2403.01749  [pdf, other

    cs.CL

    Differentially Private Synthetic Data via Foundation Model APIs 2: Text

    Authors: Chulin Xie, Zinan Lin, Arturs Backurs, Sivakanth Gopi, Da Yu, Huseyin A Inan, Harsha Nori, Haotian Jiang, Huishuai Zhang, Yin Tat Lee, Bo Li, Sergey Yekhanin

    Abstract: Text data has become extremely valuable due to the emergence of machine learning algorithms that learn from it. A lot of high-quality text data generated in the real world is private and therefore cannot be shared or used freely due to privacy concerns. Generating synthetic replicas of private text data with a formal privacy guarantee, i.e., differential privacy (DP), offers a promising and scalab… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  3. arXiv:2310.12898  [pdf, ps, other

    cs.IT math.AG

    AG codes achieve list decoding capacity over contant-sized fields

    Authors: Joshua Brakensiek, Manik Dhar, Sivakanth Gopi, Zihan Zhang

    Abstract: The recently-emerging field of higher order MDS codes has sought to unify a number of concepts in coding theory. Such areas captured by higher order MDS codes include maximally recoverable (MR) tensor codes, codes with optimal list-decoding guarantees, and codes with constrained generator matrices (as in the GM-MDS theorem). By proving these equivalences, Brakensiek-Gopi-Makam showed the existen… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 38 pages

  4. arXiv:2310.12888  [pdf, ps, other

    cs.IT math.AG math.CO

    Generalized GM-MDS: Polynomial Codes are Higher Order MDS

    Authors: Joshua Brakensiek, Manik Dhar, Sivakanth Gopi

    Abstract: The GM-MDS theorem, conjectured by Dau-Song-Dong-Yuen and proved by Lovett and Yildiz-Hassibi, shows that the generator matrices of Reed-Solomon codes can attain every possible configuration of zeros for an MDS code. The recently emerging theory of higher order MDS codes has connected the GM-MDS theorem to other important properties of Reed-Solomon codes, including showing that Reed-Solomon codes… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 34 pages

  5. arXiv:2309.11765  [pdf, other

    cs.LG cs.CR

    Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation

    Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim

    Abstract: We study the problem of in-context learning (ICL) with large language models (LLMs) on private datasets. This scenario poses privacy risks, as LLMs may leak or regurgitate the private examples demonstrated in the prompt. We propose a novel algorithm that generates synthetic few-shot demonstrations from the private dataset with formal differential privacy (DP) guarantees, and show empirically that… ▽ More

    Submitted 27 January, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

  6. arXiv:2306.11644  [pdf, other

    cs.CL cs.AI cs.LG

    Textbooks Are All You Need

    Authors: Suriya Gunasekar, Yi Zhang, Jyoti Aneja, Caio César Teodoro Mendes, Allie Del Giorno, Sivakanth Gopi, Mojan Javaheripi, Piero Kauffmann, Gustavo de Rosa, Olli Saarikivi, Adil Salim, Shital Shah, Harkirat Singh Behl, Xin Wang, Sébastien Bubeck, Ronen Eldan, Adam Tauman Kalai, Yin Tat Lee, Yuanzhi Li

    Abstract: We introduce phi-1, a new large language model for code, with significantly smaller size than competing models: phi-1 is a Transformer-based model with 1.3B parameters, trained for 4 days on 8 A100s, using a selection of ``textbook quality" data from the web (6B tokens) and synthetically generated textbooks and exercises with GPT-3.5 (1B tokens). Despite this small scale, phi-1 attains pass@1 accu… ▽ More

    Submitted 2 October, 2023; v1 submitted 20 June, 2023; originally announced June 2023.

    Comments: 26 pages; changed color scheme of plot. fixed minor typos and added couple clarifications

  7. arXiv:2305.15560  [pdf, other

    cs.CV cs.CR cs.LG

    Differentially Private Synthetic Data via Foundation Model APIs 1: Images

    Authors: Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Harsha Nori, Sergey Yekhanin

    Abstract: Generating differentially private (DP) synthetic data that closely resembles the original private data is a scalable way to mitigate privacy concerns in the current data-driven world. In contrast to current practices that train customized models for this task, we aim to generate DP Synthetic Data via APIs (DPSDA), where we treat foundation models as blackboxes and only utilize their inference APIs… ▽ More

    Submitted 29 February, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

    Comments: 49 pages, 42 figures

  8. arXiv:2305.13865  [pdf, other

    cs.LG cs.CR

    Selective Pre-training for Private Fine-tuning

    Authors: Da Yu, Sivakanth Gopi, Janardhan Kulkarni, Zinan Lin, Saurabh Naik, Tomasz Lukasz Religa, Jian Yin, Huishuai Zhang

    Abstract: Text prediction models, when used in applications like email clients or word processors, must protect user data privacy and adhere to model size constraints. These constraints are crucial to meet memory and inference time requirements, as well as to reduce inference costs. Building small, fast, and private domain-specific language models is a thriving area of research. In this work, we show that a… ▽ More

    Submitted 2 July, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: Transactions on Machine Learning Research. Code available at https://github.com/dayu11/selective_pretraining_for_private_finetuning

  9. arXiv:2302.06085  [pdf, ps, other

    cs.DS cs.CR cs.LG math.PR stat.CO

    Algorithmic Aspects of the Log-Laplace Transform and a Non-Euclidean Proximal Sampler

    Authors: Sivakanth Gopi, Yin Tat Lee, Daogao Liu, Ruoqi Shen, Kevin Tian

    Abstract: The development of efficient sampling algorithms catering to non-Euclidean geometries has been a challenging endeavor, as discretization techniques which succeed in the Euclidean setting do not readily carry over to more general settings. We develop a non-Euclidean analog of the recent proximal sampler of [LST21], which naturally induces regularization by an object known as the log-Laplace transfo… ▽ More

    Submitted 22 February, 2023; v1 submitted 12 February, 2023; originally announced February 2023.

    Comments: Comments welcome! v2 improves constant in duality result, adds citations

  10. arXiv:2212.12123  [pdf, ps, other

    cs.IT

    A construction of Maximally Recoverable LRCs for small number of local groups

    Authors: Manik Dhar, Sivakanth Gopi

    Abstract: Maximally Recoverable Local Reconstruction Codes (LRCs) are codes designed for distributed storage to provide maximum resilience to failures for a given amount of storage redundancy and locality. An $(n,r,h,a,g)$-MR LRC has $n$ coordinates divided into $g$ local groups of size $r=n/g$, where each local group has `$a$' local parity checks and there are an additional `$h$' global parity checks. Such… ▽ More

    Submitted 11 May, 2023; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: Fixed minor typos. Added more details about comparison with earlier results. To appear in ISIT 2023. arXiv admin note: text overlap with arXiv:2012.07804

  11. arXiv:2212.11262  [pdf, ps, other

    cs.IT

    Improved Field Size Bounds for Higher Order MDS Codes

    Authors: Joshua Brakensiek, Manik Dhar, Sivakanth Gopi

    Abstract: Higher order MDS codes are an interesting generalization of MDS codes recently introduced by Brakensiek, Gopi and Makam (IEEE Trans. Inf. Theory 2022). In later works, they were shown to be intimately connected to optimally list-decodable codes and maximally recoverable tensor codes. Therefore (explicit) constructions of higher order MDS codes over small fields is an important open problem. Higher… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: 18 pages, 2 tables

  12. arXiv:2207.08347  [pdf, ps, other

    cs.LG cs.CR math.OC stat.ML

    Private Convex Optimization in General Norms

    Authors: Sivakanth Gopi, Yin Tat Lee, Daogao Liu, Ruoqi Shen, Kevin Tian

    Abstract: We propose a new framework for differentially private optimization of convex functions which are Lipschitz in an arbitrary norm $\|\cdot\|$. Our algorithms are based on a regularized exponential mechanism which samples from the density $\propto \exp(-k(F+μr))$ where $F$ is the empirical loss and $r$ is a regularizer which is strongly convex with respect to $\|\cdot\|$, generalizing a recent work o… ▽ More

    Submitted 10 November, 2022; v1 submitted 17 July, 2022; originally announced July 2022.

    Comments: SODA 2023

  13. arXiv:2206.05256  [pdf, ps, other

    cs.IT cs.CC math.CO

    Generic Reed-Solomon codes achieve list-decoding capacity

    Authors: Joshua Brakensiek, Sivakanth Gopi, Visu Makam

    Abstract: In a recent paper, Brakensiek, Gopi and Makam introduced higher order MDS codes as a generalization of MDS codes. An order-$\ell$ MDS code, denoted by $\operatorname{MDS}(\ell)$, has the property that any $\ell$ subspaces formed from columns of its generator matrix intersect as minimally as possible. An independent work by Roth defined a different notion of higher order MDS codes as those achievin… ▽ More

    Submitted 13 April, 2023; v1 submitted 10 June, 2022; originally announced June 2022.

    Comments: 37 pages

  14. arXiv:2203.00263  [pdf, ps, other

    cs.DS cs.CR cs.LG math.OC math.PR

    Private Convex Optimization via Exponential Mechanism

    Authors: Sivakanth Gopi, Yin Tat Lee, Daogao Liu

    Abstract: In this paper, we study private optimization problems for non-smooth convex functions $F(x)=\mathbb{E}_i f_i(x)$ on $\mathbb{R}^d$. We show that modifying the exponential mechanism by adding an $\ell_2^2$ regularizer to $F(x)$ and sampling from $π(x)\propto \exp(-k(F(x)+μ\|x\|_2^2/2))$ recovers both the known optimal empirical risk and population loss under $(ε,δ)$-DP. Furthermore, we show how to… ▽ More

    Submitted 28 July, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

  15. arXiv:2110.06500  [pdf, other

    cs.LG cs.CL cs.CR stat.ML

    Differentially Private Fine-tuning of Language Models

    Authors: Da Yu, Saurabh Naik, Arturs Backurs, Sivakanth Gopi, Huseyin A. Inan, Gautam Kamath, Janardhan Kulkarni, Yin Tat Lee, Andre Manoel, Lukas Wutschitz, Sergey Yekhanin, Huishuai Zhang

    Abstract: We give simpler, sparser, and faster algorithms for differentially private fine-tuning of large-scale pre-trained language models, which achieve the state-of-the-art privacy versus utility tradeoffs on many standard NLP tasks. We propose a meta-framework for this problem, inspired by the recent success of highly parameter-efficient methods for fine-tuning. Our experiments show that differentially… ▽ More

    Submitted 14 July, 2022; v1 submitted 13 October, 2021; originally announced October 2021.

    Comments: ICLR 2022. Code available at https://github.com/huseyinatahaninan/Differentially-Private-Fine-tuning-of-Language-Models

  16. arXiv:2108.02831  [pdf, other

    cs.LG cs.CR cs.DS

    Differentially Private n-gram Extraction

    Authors: Kunho Kim, Sivakanth Gopi, Janardhan Kulkarni, Sergey Yekhanin

    Abstract: We revisit the problem of $n$-gram extraction in the differential privacy setting. In this problem, given a corpus of private text data, the goal is to release as many $n$-grams as possible while preserving user level privacy. Extracting $n$-grams is a fundamental subroutine in many NLP applications such as sentence completion, response generation for emails etc. The problem also arises in other a… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

  17. arXiv:2107.10822  [pdf, other

    cs.IT cs.CC

    Lower Bounds for Maximally Recoverable Tensor Code and Higher Order MDS Codes

    Authors: Joshua Brakensiek, Sivakanth Gopi, Visu Makam

    Abstract: An $(m,n,a,b)$-tensor code consists of $m\times n$ matrices whose columns satisfy `$a$' parity checks and rows satisfy `$b$' parity checks (i.e., a tensor code is the tensor product of a column code and row code). Tensor codes are useful in distributed storage because a single erasure can be corrected quickly either by reading its row or column. Maximally Recoverable (MR) Tensor Codes, introduced… ▽ More

    Submitted 2 December, 2022; v1 submitted 22 July, 2021; originally announced July 2021.

    Comments: 34 pages, in IEEE Transactions on Information Theory

  18. arXiv:2107.06440  [pdf, other

    cs.IT

    Trellis BMA: Coded Trace Reconstruction on IDS Channels for DNA Storage

    Authors: Sundara Rajan Srinivasavaradhan, Sivakanth Gopi, Henry D. Pfister, Sergey Yekhanin

    Abstract: Sequencing a DNA strand, as part of the read process in DNA storage, produces multiple noisy copies which can be combined to produce better estimates of the original strand; this is called trace reconstruction. One can reduce the error rate further by introducing redundancy in the write sequence and this is called coded trace reconstruction. In this paper, we model the DNA storage channel as an in… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: Extended version of paper presented at ISIT 2021

  19. arXiv:2106.02848  [pdf, ps, other

    cs.DS cs.CR cs.LG

    Numerical Composition of Differential Privacy

    Authors: Sivakanth Gopi, Yin Tat Lee, Lukas Wutschitz

    Abstract: We give a fast algorithm to optimally compose privacy guarantees of differentially private (DP) algorithms to arbitrary accuracy. Our method is based on the notion of privacy loss random variables to quantify the privacy loss of DP algorithms. The running time and memory needed for our algorithm to approximate the privacy curve of a DP algorithm composed with itself $k$ times is… ▽ More

    Submitted 26 October, 2021; v1 submitted 5 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2021 Spotlight

  20. arXiv:2102.03013  [pdf, other

    cs.LG cs.CR

    Fast and Memory Efficient Differentially Private-SGD via JL Projections

    Authors: Zhiqi Bu, Sivakanth Gopi, Janardhan Kulkarni, Yin Tat Lee, Judy Hanwen Shen, Uthaipon Tantipongpipat

    Abstract: Differentially Private-SGD (DP-SGD) of Abadi et al. (2016) and its variations are the only known algorithms for private training of large scale neural networks. This algorithm requires computation of per-sample gradients norms which is extremely slow and memory intensive in practice. In this paper, we present a new framework to design differentially private optimizers called DP-SGD-JL and DP-Adam-… ▽ More

    Submitted 5 February, 2021; originally announced February 2021.

  21. arXiv:2012.07804  [pdf, other

    cs.IT cs.CC math.RA

    Improved Maximally Recoverable LRCs using Skew Polynomials

    Authors: Sivakanth Gopi, Venkatesan Guruswami

    Abstract: An $(n,r,h,a,q)$-Local Reconstruction Code (LRC) is a linear code over $\mathbb{F}_q$ of length $n$, whose codeword symbols are partitioned into $n/r$ local groups each of size $r$. Each local group satisfies `$a$' local parity checks to recover from `$a$' erasures in that local group and there are further $h$ global parity checks to provide fault tolerance from more global erasure patterns. Such… ▽ More

    Submitted 18 May, 2022; v1 submitted 14 December, 2020; originally announced December 2020.

  22. arXiv:2002.09745  [pdf, other

    cs.CR cs.DS cs.LG stat.ML

    Differentially Private Set Union

    Authors: Sivakanth Gopi, Pankaj Gulhane, Janardhan Kulkarni, Judy Hanwen Shen, Milad Shokouhi, Sergey Yekhanin

    Abstract: We study the basic operation of set union in the global model of differential privacy. In this problem, we are given a universe $U$ of items, possibly of infinite size, and a database $D$ of users. Each user $i$ contributes a subset $W_i \subseteq U$ of items. We want an ($ε$,$δ$)-differentially private algorithm which outputs a subset $S \subset \cup_i W_i$ such that the size of $S$ is as large a… ▽ More

    Submitted 6 April, 2022; v1 submitted 22 February, 2020; originally announced February 2020.

    Comments: 23 pages, 7 figures

  23. arXiv:2002.09465  [pdf, other

    cs.DS cs.CR cs.IT cs.LG stat.ML

    Locally Private Hypothesis Selection

    Authors: Sivakanth Gopi, Gautam Kamath, Janardhan Kulkarni, Aleksandar Nikolov, Zhiwei Steven Wu, Huanyu Zhang

    Abstract: We initiate the study of hypothesis selection under local differential privacy. Given samples from an unknown probability distribution $p$ and a set of $k$ probability distributions $\mathcal{Q}$, we aim to output, under the constraints of $\varepsilon$-local differential privacy, a distribution from $\mathcal{Q}$ whose total variation distance to $p$ is comparable to the best such distribution. T… ▽ More

    Submitted 19 June, 2020; v1 submitted 21 February, 2020; originally announced February 2020.

    Comments: To appear in COLT 2020

  24. arXiv:1902.04740  [pdf, ps, other

    cs.CC cs.DS cs.IT cs.LO

    CSPs with Global Modular Constraints: Algorithms and Hardness via Polynomial Representations

    Authors: Joshua Brakensiek, Sivakanth Gopi, Venkatesan Guruswami

    Abstract: We study the complexity of Boolean constraint satisfaction problems (CSPs) when the assignment must have Hamming weight in some congruence class modulo M, for various choices of the modulus M. Due to the known classification of tractable Boolean CSPs, this mainly reduces to the study of three cases: 2-SAT, HORN-SAT, and LIN-2 (linear equations mod 2). We classify the moduli M for which these respe… ▽ More

    Submitted 12 February, 2019; originally announced February 2019.

    Comments: 52 pages; to appear in STOC 2019

  25. arXiv:1809.10372  [pdf, ps, other

    cs.CC cs.DM cs.IT math.CO

    Spanoids - an abstraction of spanning structures, and a barrier for LCCs

    Authors: Zeev Dvir, Sivakanth Gopi, Yuzhou Gu, Avi Wigderson

    Abstract: We introduce a simple logical inference structure we call a $\textsf{spanoid}$ (generalizing the notion of a matroid), which captures well-studied problems in several areas. These include combinatorial geometry, algebra (arrangements of hypersurfaces and ideals), statistical physics (bootstrap percolation) and coding theory. We initiate a thorough investigation of spanoids, from computational and… ▽ More

    Submitted 20 November, 2018; v1 submitted 27 September, 2018; originally announced September 2018.

    Comments: Conference version to appear in ITCS 2019. arXiv:1810.02494 is merged into the new version

  26. arXiv:1711.05624  [pdf, ps, other

    math.CO cs.DM math.FA math.PR

    Gaussian width bounds with applications to arithmetic progressions in random settings

    Authors: Jop Briët, Sivakanth Gopi

    Abstract: Motivated by problems on random differences in Szemerédi's theorem and on large deviations for arithmetic progressions in random sets, we prove upper bounds on the Gaussian width of point sets that are formed by the image of the $n$-dimensional Boolean hypercube under a map** $ψ:\mathbb{R}^n\to\mathbb{R}^k$, where each coordinate is a constant-degree multilinear polynomial with 0-1 coefficients.… ▽ More

    Submitted 18 October, 2018; v1 submitted 15 November, 2017; originally announced November 2017.

    Comments: 18 pages, some typos fixed

    Journal ref: Internat. Math. Res. Notices (2018)

  27. arXiv:1710.10322  [pdf, other

    cs.IT cs.CC

    Maximally Recoverable LRCs: A field size lower bound and constructions for few heavy parities

    Authors: Sivakanth Gopi, Venkatesan Guruswami, Sergey Yekhanin

    Abstract: The explosion in the volumes of data being stored online has resulted in distributed storage systems transitioning to erasure coding based schemes. Local Reconstruction Codes (LRCs) have emerged as the codes of choice for these applications. These codes can correct a small number of erasures by accessing only a small number of remaining coordinates. An $(n,r,h,a,q)$-LRC is a linear code over… ▽ More

    Submitted 15 November, 2018; v1 submitted 27 October, 2017; originally announced October 2017.

    Comments: Conference version to appear in Symposium on Discrete Algorithms (SODA) 2018

  28. arXiv:1611.06980  [pdf, ps, other

    cs.CC cs.DM

    Lower bounds for 2-query LCCs over large alphabet

    Authors: Arnab Bhattacharyya, Sivakanth Gopi, Avishay Tal

    Abstract: A locally correctable code (LCC) is an error correcting code that allows correction of any arbitrary coordinate of a corrupted codeword by querying only a few coordinates. We show that any {\em zero-error} $2$-query locally correctable code $\mathcal{C}: \{0,1\}^k \to Σ^n$ that can correct a constant fraction of corrupted symbols must have $n \geq \exp(k/\log|Σ|)$. We say that an LCC is zero-error… ▽ More

    Submitted 28 April, 2017; v1 submitted 21 November, 2016; originally announced November 2016.

  29. arXiv:1609.06355  [pdf, ps, other

    cs.CC math.CO math.PR

    Outlaw distributions and locally decodable codes

    Authors: Jop Briët, Zeev Dvir, Sivakanth Gopi

    Abstract: Locally decodable codes (LDCs) are error correcting codes that allow for decoding of a single message bit using a small number of queries to a corrupted encoding. Despite decades of study, the optimal trade-off between query complexity and codeword length is far from understood. In this work, we give a new characterization of LDCs using distributions over Boolean functions whose expectation is har… ▽ More

    Submitted 26 June, 2017; v1 submitted 20 September, 2016; originally announced September 2016.

    Comments: A preliminary version of this paper appeared in the proceedings of ITCS 2017

  30. arXiv:1605.03933  [pdf, ps, other

    cs.DS cs.IT cs.LG stat.ML

    Competitive analysis of the top-K ranking problem

    Authors: Xi Chen, Sivakanth Gopi, Jieming Mao, Jon Schneider

    Abstract: Motivated by applications in recommender systems, web search, social choice and crowdsourcing, we consider the problem of identifying the set of top $K$ items from noisy pairwise comparisons. In our setting, we are non-actively given $r$ pairwise comparisons between each pair of $n$ items, where each comparison has noise constrained by a very general noise model called the strong stochastic transi… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

  31. arXiv:1511.07558  [pdf, ps, other

    cs.CC

    Lower bounds for constant query affine-invariant LCCs and LTCs

    Authors: Arnab Bhattacharyya, Sivakanth Gopi

    Abstract: Affine-invariant codes are codes whose coordinates form a vector space over a finite field and which are invariant under affine transformations of the coordinate space. They form a natural, well-studied class of codes; they include popular codes such as Reed-Muller and Reed-Solomon. A particularly appealing feature of affine-invariant codes is that they seem well-suited to admit local correctors a… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

  32. arXiv:1412.1060  [pdf, ps, other

    math.CO cs.CG

    On the number of rich lines in truly high dimensional sets

    Authors: Zeev Dvir, Sivakanth Gopi

    Abstract: We prove a new upper bound on the number of $r$-rich lines (lines with at least $r$ points) in a `truly' $d$-dimensional configuration of points $v_1,\ldots,v_n \in \mathbb{C}^d$. More formally, we show that, if the number of $r$-rich lines is significantly larger than $n^2/r^d$ then there must exist a large subset of the points contained in a hyperplane. We conjecture that the factor $r^d$ can be… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

  33. arXiv:1407.6692  [pdf, ps, other

    cs.CC cs.CR cs.IR

    2-Server PIR with sub-polynomial communication

    Authors: Zeev Dvir, Sivakanth Gopi

    Abstract: A 2-server Private Information Retrieval (PIR) scheme allows a user to retrieve the $i$th bit of an $n$-bit database replicated among two servers (which do not communicate) while not revealing any information about $i$ to either server. In this work we construct a 1-round 2-server PIR with total communication cost $n^{O({\sqrt{\log\log n/\log n}})}$. This improves over the currently known 2-server… ▽ More

    Submitted 24 July, 2014; originally announced July 2014.