2511002207
  • Open Access
  • Review

A Unified Framework for Constructing Information-Theoretic Private Information Retrieval

  • Liangfeng Zhang

Received: 12 Aug 2025 | Revised: 07 Nov 2025 | Accepted: 07 Nov 2025 | Published: 18 Nov 2025

Abstract

Retrieving up-to-date information from a publicly accessible database poses significant threats to the user’s privacy. Private information retrieval (PIR) protocols allow a user to retrieve any entry from a database, without revealing the identity of the entry being retrieved to the server(s). Such protocols have found numerous applications in both theoretical studies and real-life scenarios. The existing PIR constructions mainly give multi-server information-theoretic PIR (IT-PIR) protocols or single-server computational PIR (CPIR) protocols. Compared with CPIR, IT-PIR protocols are computationally more efficient and secure in the presence of unbounded servers. The most classical and challenging problem in the realm of IT-PIR is constructing protocols with lower communication complexity. In this review, we introduce a new discrete structure called families of orthogonal arrays with span capability (FOASC) and propose a unified framework for constructing IT-PIR protocols. We show how the most influential IT-PIR protocols in the literature can be captured by the framework. We also put forward several interesting open problems concerning FOASC, whose solutions may result in innovative IT-PIR protocols.

References 

  • 1.
    Chor, B.; Kushilevitz, E.; Goldreich, O.; et al. Private information retrieval. In Proceedings of the FOCS 1995, Milwaukee, WI, USA, 23–25 October 1995; pp. 41–50.
  • 2.
    Kushilevitz, E.; Ostrovsky, R. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, FL, USA, 20–22 October 1997; pp. 364–373.
  • 3.
    Wang, F.; Yun, C.; Goldwasser, S.; et al. Splinter: Practical private queries on public data. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27–29 March 2017; pp. 299–313.
  • 4.
    Angel, S.; Setty, S. Unobservable communication over fully untrusted infrastructure.In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), Savannah, GA, USA, 2–4 November 2016; pp. 551–569.
  • 5.
    Angel, S.; Chen, H.; Laine, K.; et al. PIR with compressed queries and amortized query processing. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–23 May 2018; pp. 962–979.
  • 6.
    Gupta, T.; Crooks, N.; Mulhern, W.; et al. Scalable and private media consumption with Popcorn. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA, 16–18 March 2016; pp. 91–107.
  • 7.
    Kales, D.; Rechberger, C.; Schneider, T.; et al. Mobile private contact discovery at scale. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 1447–1464.
  • 8.
    Kogan, D.; Corrigan-Gibbs, H. Private blocklist lookups with Checklist. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada, 11–13 August 2021; pp. 875–892.
  • 9.
    Backes, M.; Kate, A.; Maffei, M.; et al. ObliviAd: Provably secure and practical online behavioral advertising. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA USA, 20–23 May 2012; pp. 257–271.
  • 10.
    Servan-Schreiber, S.; Hogan, K.; Devadas, S. AdVeil: A private targeted–advertising ecosystem. IACR Cryptol. Eprint Arch. 2021, 2021, 1032.
  • 11.
    Henzinger, A.; Hong, M.M.; Corrigan-Gibbs, H.; et al. One server for the price of two: Simple and fast single-server private information retrieval. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 3889–3905.
  • 12.
    Henzinger, A.; Dauterman, E.; Corrigan-Gibbs, H.; et al. Private web search with Tiptoe. In Proceedings of the 29th Symposium on Operating Systems Principles, Koblenz, Germany, 23–26 October 2023; pp. 396–416.
  • 13.
    Henry, R.; Olumofin, F.; Goldberg, I. Practical PIR for electronic commerce. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, October 17–21 2011; pp. 677–690.
  • 14.
    Ghinita, G.; Kalnis, P.; Khoshgozaran, A.; Shahabi, C.; et al. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 10–12 June 2008; pp. 121–132.
  • 15.
    Chen, H.; Huang, Z.; Laine, K.; et al. Labeled PSI from fully homomorphic encryption with malicious security. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1223–1237.
  • 16.
    Google. Available online: https://services.google.com/fh/files/misc/zero touch enrollment for chrome os devices one pager.pdf (accessed on 11 August 2025).
  • 17.
    Menon, S.J.; Wu, D.J. SPIRAL: Fast, high-rate single-server PIR via FHE composition. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 23–26 May 2022; pp. 930–947.
  • 18.
    Davidson, A.; Pestana, G.; Celi, S. FrodoPIR: Simple, scalable, singleserver private information retrieval. Proc. Priv. Enhancing Technol. 2023, 2023, 365–383.
  • 19.
    Katz, J.; Trevisan, L. On the efficiency of local decoding procedures for error-correcting codes. In Proceedings of the Thirty-Second Annual ACM Aymposium on Theory of Computing Portland, OR, USA, 21–23 May 2000; pp. 80–86.
  • 20.
    Yekhanin, S. Locally decodable codes. Found. Trends Theor. Comput. Sci. 2012, 6, 139–255.
  • 21.
    Zhang, L.F. A coding-theoretic application of Baranyai’s theorem. IEEE Trans. Inf. Theory 2014, 60, 6988–6992.
  • 22.

    Shai, Y.; Kushilevitz, E. On the hardness of information-theoretic multiparty computation. In Proceedings of the EURO-CRYPT, Interlaken, Switzerland, 2–6 May 2004; pp. 439–455.

  • 23.
    Beimel, A.; Chee, Y.M.; Wang, H.; et al. Communication-efficient distributed oblivious transfer. J. Comput. Syst. Sci. 2012, 78, 1142–1157.
  • 24.
    Beimel, A.; Ishai, Y.; Kushilevitz, E.; et al. One-way functions are essential for single-server private information retrieval. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, Atlanta, GA, USA, 1–4 May 1999; pp. 89–98.
  • 25.
    Di Crescenzo, G.; Malkin, T.; Ostrovsky, R. Single database private information retrieval implies oblivious transfer. In Proceedings of the EUROCRYPT 2000, Bruges, Belgium, 14–18 May 2000; pp.122–138.
  • 26.
    Naor, M.; Pinkas, B. Oblivious transfer and polynomial evaluation. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, Dallas, TX, USA, 23–26 May 1999; pp. 245–254.
  • 27.
    Ishai, Y.; Kushilevitz, E.; Ostrovsky, R. Sufficient conditions for collision-resistant hashing. In Proceedings of the TCC, Cambridge, MA, USA, 10–12 February 2005; pp. 445–456.
  • 28.
    Kalai, Y.T.; Raz, R. Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP. In Proceedings of the 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), Berkeley, CA, USA, 21–24 October 2006; pp. 355–366.
  • 29.
    Ambainis, A. Upper bound on communication complexity of private information retrieval. In Proceedings of the Interna- tional Colloquium on Automata, Languages, and Programming (ICALP), Bologna, Italy, 7–11 July 1997; pp. 401–407.
  • 30.
    Itoh, T. Efficient private information retrieval. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E82-A(1) 1999, 82, 11–20.
  • 31.
    Ishai, Y.; Kushilevitz, E. Improved Upper Bounds on Information-Theoretic Private Information Retrieval. In Proceedings of the thirty-first annual ACM symposium on Theory of computing (STOC), Atlanta, GA, USA, 1–4 May 1999; pp. 79–88.
  • 32.
    Beimel, A.; Ishai, Y. Information-theoretic private information retrieval: A unified construction. In Proceedings of the ICALP, Crete, Greece, 8–12 July 2001; pp. 912–926.
  • 33.
    Woodruff, D.; Yekhanin, S. A geometric approach to information-theoretic private information retrieval. In Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC), San Jose, CA, USA, 11–15 June 2005; pp. 275–284.
  • 34.
    Yekhanin, S. Towards 3-query locally decodable codes of subexponential length. In Proceedings of the STOC, San Diego, CA, USA, 11–13 June 2007; pp. 266–274.
  • 35.
    Raghavendra, P. A note on Yekhanin’s locally decodable codes. In Proceedings of the Electronic Colloquium on Computational Complexity TR07, Weizmann Institute of Science, Rehovot, Israel, 15 January 2007.
  • 36.
    Kedlaya, K.S.; Yekhanin, S. Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers. In Proceedings of the CCC, College Park, MD, USA, 23–26 June 2008; pp. 175–186.
  • 37.
    Efremenko, K. 3-query locally decodable codes of subexponential length. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, USA, 31 May–2 June 2009; pp. 39–44.
  • 38.
    Itoh, T.; Suzuki, Y. Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Trans. Inf. Syst. 2010, 93, 263–270.
  • 39.
    Chee, Y.M.; Feng, T.; Ling, S.; et al. Query-efficient locally decodable codes of subexponential length. Comput. Complex. 2013, 22, 159–189.
  • 40.
    Dvir, Z.; Gopi, S. 2-Server PIR with sub-polynomial communication. In Proceedings of the STOC, Portland, OR, USA, 14–17 June 2015; pp.577–584.
  • 41.
    Alon, B.; Beimel, A.; Lasri, O. Simplified PIR and CDS Protocols and improved linear secret-sharing protocols. IACR Cryptol. Eprint Arch. 2024, 2024, 1599.
  • 42.
    Ghasemi, F.; Kopparty, S.; Sudan, M. Improved PIR protocols using matching vectors and derivatives. In Proceedings of the STOC, Prague, Czech Republic, 23–27 June 2025; pp. 1648–1656.
  • 43.
    Cachin, C.; Micali, S.; Stadler, M. Computationally private information retrieval with polylogarithmic communication. In Proceedings of the EUROCRYPT, Prague, Czech Republic, 2–6 May 1999; pp. 402–414.
  • 44.
    Chang, Y.-C. Single database private information retrieval with logarithmic communication. In Proceedings of the ACISP, Sydney, Australia, 13–15 July 2004; pp. 50–61.
  • 45.
    Lipmaa, H. An oblivious transfer protocol with log-squared communication. In Proceedings of the ISC, Singapore, 20–23 September 2005; pp.314–328.
  • 46.
    Gentry, C.; Ramzan, Z. Single-database private information retrieval with constant communication rate. In Proceedings of the ICALP 2005, Lisbon, Portugal, 11–15 July 2005; pp. 803–815.
  • 47.
    Melchor, C.A.; Gaborit, P. A lattice-based computationally-efficient private information retrieval protocol. IACR Cryptol. Eprint Arch. 2007, 2007, 446.
  • 48.
    Lipmaa, H. First CPIR protocol with data-dependent computation. In Proceedings of the ICISC 2009, Seoul, Korea, 2–4 December 2009; pp. 193–210.
  • 49.
    Groth, J.; Kiayias, A.; Lipmaa, H. Multi-query computationally-private information retrieval with constant communication rate. In Proceedings of the Public Key Cryptography 2010, Paris, France, 26–28 May 2010; pp. 107–123.
  • 50.
    Yi X.; Kaosar, M.G.; Paulet, R.; et al. Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 2013, 25, 1125–1134.
  • 51.
    Dong, C.; Chen, L. A fast single server private information retrieval protocol with low communication cost. In Proceedings of the ESORICS (1) 2014, Wroclaw, Poland, 7–11 September 2014; pp. 380–399
  • 52.
    Kiayias, A.; Leonardos, N.; Lipmaa, H.; et al. Optimal rate private information retrieval from homomorphic encryption. In Proceedings of the Privacy Enhancing Technologies, Philadelphia, PA, USA, 30 June–2 July 2015; pp. 222–243.
  • 53.
    Lipmaa, H.; Pavlyk, K. A simpler rate-optimal CPIR protocol. In Proceedings of the Financial Cryptography 2017, Sliema, Malta, 3–7 April 2017; pp. 621–638
  • 54.
    Beimel, A.; Ishai, Y.; Malkin, T. Reducing the servers computation in private information retrieval: PIR with preprocessing. In Proceedings of the CRYPTO 2000, Santa Barbara, CA, USA, 20–24 August 2000; pp. 55–73.
  • 55.
    Sion, R.; Carbunar, B. On the practicality of private information retrieval. In Proceedings of the NDSS 2007, San Diego, CA, USA, 26 February–4 March 2007.
  • 56.
    Singh, J.; Wei, Y.; Zikas, V. Information-theoretic multi-server private information retrieval with client preprocessing. In Proceedings of the TCC (4) 2024, Milan, Italy, 2–6 December 2024; pp. 423–450.
  • 57.
    Ishai, Y.; Shi, E.; Wichs, D. PIR with client-side preprocessing: Information-theoretic constructions and lower bounds. In Proceedings of the CRYPTO (9) 2024, Santa Barbara, CA, USA, 18–22 August 2024; pp. 148–182.
  • 58.
    Boyle, E.; Ishai, Y.; Pass, R.; et al. Can we access a database both locally and privately? In Proceedings of the TCC (2) 2017, Baltimore, MD, USA, 12–15 November 2017; pp. 662–693.
  • 59.
    Canetti, R.; Holmgren, J.; Richelson, S. Towards doubly efficient private information retrieval. In Proceedings of the TCC (2) 2017, Baltimore, MD, USA, 12–15 November 2017; pp. 694–726.
  • 60.
    Corrigan-Gibbs, H.; Kogan, D. Private information retrieval with sublinear online time. In Proceedings of the EUROCRYPT (1) 2020, Zagreb, Croatia, 10–14 May 2020; pp. 44–75.
  • 61.
    Ghoshal, A.; Zhou, M.; Shi, E. Efficient pre-processing PIR without public-key cryptography. In Proceedings of the EUROCRYPT (6) 2024, Zurich, Switzerland, 26–30 May 2024; pp. 210–240.
  • 62.
    Wei–Kai Lin, W.-K.; Mook, E.; Wichs, D. Doubly efficient private information retrieval and fully homomorphic ram computation from ring LWE. In Proceedings of the STOC 2023, Orlando, FL, USA, 20–23 June 2023; pp. 595–608.
  • 63.
    Ren, L.; Mughees, M.H.; Sun, I. Simple and practical amortized sublinear private information retrieval using dummy subsets. In Proceedings of the CCS 2024, V Vancouver, BC, USA, 24–27 October 2024; pp. 1420–1433.
  • 64.
    Patel, S.; Persiano, G.; Yeo, K. Private stateful information retrieval. In Proceedings of the CCS 2018, Toronto, ON, Canada, 15–19 October 2018; pp. 1002–1019.
  • 65.
    Shi, E.; Aqeel, W.; Rasekaran, B.; et al. Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time. In Proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, 16–20 August 2021; pp. 641–669.
  • 66.
    Zhou, M.; Park, A.; Zheng, W.; et al. Piano: Extremely simple, single-server PIR with sublinear server computation. In Proceedings of the IEEE Symposium on Security and Privacy 2024, San Francisco, CA, USA, 19–23 May 2024; pp. 4296–4314.
  • 67.
    Ali, A.; Lepoint, T.; Patel, S.; et al. Communication-computation trade-offs in PIR. In Proceedings of the USENIX Security Symposium 2021, Vancouver, BC, Canada, 11–13 August 2021; pp. 1811–1828.
  • 68.
    Mughees, M.H.; Chen, H.; Ren, L. OnionPIR: Response efficient single-server PIR. In Proceedings of the CCS 2021, New York, NY, USA, 15–19 November 2021; pp. 2292–2306.
  • 69.
    Mahdavi, R.A.; Kerschbaum, F. Constant-weight PIR: Single-round keyword PIR via constant-weight equality operators. In Proceedings of the USENIX Security Symposium 2022, Boston, MA, USA, 10–12 August 2022; pp. 1723–1740.
  • 70.
    Corrigan-Gibbs, H.; Henzinger, A.; Kogan, D. Single-server private information retrieval with sublinear amortized time. In Proceedings of the EUROCRYPT (2) 2022, Trondheim, Norway, 30 May–3 June 2022; pp. 3–33.
  • 71.
    Zhou, M.; Lin, W.-K.; Tselekounis, Y.; et al. Optimal single-server private information retrieval. In Proceedings of the EUROCRYPT (1) 2023, Lyon, France, 23–27 April 2023; pp. 395–425.
  • 72.
    Lazzaretti, A.; Papamanthou, C. TreePIR: Sublinear-time and polylog-bandwidth private information retrieval from DDH. In Proceedings of the CRYPTO (2) 2023, Santa Barbara, CA, USA, 19–24 August 2023; pp. 284–314.
  • 73.
    Luo, M.; Liu, F.-H.; Wang, H. Faster FHE-based single-server private information retrieval. In Proceedings of the CCS 2024, Vancouver, BC, Canada, 24–27 October 2024; pp. 1405–1419.
  • 74.
    Li, B.; Micciancio, D.; Raykova, M.; et al. Hintless single-server private information retrieval. In Proceedings of 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2024; pp. 183–217.
  • 75.
    Lazzaretti, A.; Papamanthou, C. Single pass client-preprocessing private information retrieval. In Proceedings of the USENIX Security Symposium 2024, Philadelphia, PA, USA, 14–16 August 2024; pp. 5967–5984.
  • 76.
    Fisch, B.; Lazzaretti, A.; Liu, Z.; et al. ThorPIR: Single server PIR via homomorphic thorp shuffles. In Proceedings of the CCS 2024, Vancouver, BC, Canada, 24–27 October 2024; pp. 1448–1462.
  • 77.
    Menon, S.J.; Wu, D.J. YPIR: High-throughput single-server PIR with silent preprocessing. In Proceedings of the USENIX Security Symposium 2024, Philadelphia, PA, USA, 14–16 August 2024; pp. 5985–6002.
  • 78.
    Hoover, A.; Patel, S.; Persiano, G.; et al. Plinko: Single-server PIR with efficient updates via invertible PRFs. In Proceedings of the EUROCRYPT (6) 2025, Madrid, Spain, 3–4 May 2025; pp. 3–33.
  • 79.
    Wang, Z.; Ren, L. Single-server client preprocessing PIR with tight space-time trade-off. In Proceedings of the EURO-CRYPT (6) 2025, Madrid, Spain, 3–4 May 2025; pp. 94–122.
  • 80.
    Amos Beimel, A.; Yoav Stahl, Y. Robust information-theoretic private information retrieval. In Proceedings of the SCN 2002, Amalfi, Italy, 11–13 September 2002; pp. 326–341.
  • 81.
    Goldberg, I. Improving the robustness of private information retrieval. In Proceedings of the IEEE Symposium on Security and Privacy 2007, Oakland, CA, USA, 20–23 May 2007; pp. 131–148.
  • 82.
    Devet, C.; Goldberg,I.; Heninger, N. Optimally robust private information retrieval. In Proceedings of the USENIX Security Symposium 2012, Bellevue, WA, USA, 8–10 August 2012; pp. 269–283.
  • 83.
    Kurosawa, K. How to correct errors in multi-server PIR. In Proceedings of the ASIACRYPT (2) 2019, Kobe, Japan, 8–12 December 2019; pp. 564–574.
  • 84.
    Zhang, L.F.; Wang, H.; Wang, L.-P. Byzantine-robust private information retrieval with low communication and efficient decoding. In Proceedings of the AsiaCCS 2022, Nagasaki, Japan, 30 May–3 June 2022; pp. 1079–1085.
  • 85.
    Eriguchi, R.; Kurosawa, K.; Nuida, K. On the optimal communication complexity of error-correcting multi-server PIR. In Proceedings of the TCC (3) 2022, Chicago, IL, USA, 7–10 November 2022, 60–88.
  • 86.
    Eriguchi, R.; Kurosawa, K.; Nuida, K. Efficient and generic methods to achieve active security in private information retrieval and more advanced database search. In Proceedings of the EUROCRYPT (5) 2024, Zurich, Switzerland, 26–30 May 2024; pp. 92–121.
  • 87.
    Zhang, L.F; Safavi-Naini, R. Verifiable multi-server private information retrieval. In Proceedings of the ACNS 2014, Lausanne, Switzerland, 10–13 June 2014; pp. 62–79.
  • 88.
    Zhu, L.; Lin, C.; Lin, F.; et al. Postquantum cheating detectable private information retrieval. In Proceedings of the SEC 2022, Boston, MA, USA, 10–12 August 2022; pp. 431–448.
  • 89.
    Cao, Q.; Tran, H.Y.; Dau, S.H.; et al. Committed private information retrieval. In Proceedings of the ESORICS (1) 2023, The Hague, The Netherlands, 25–29 September 2023; pp. 393–413.
  • 90.
    Zhang, L.F.; Wang, H. Multi-server verifiable computation of low-degree polynomials. In Proceedings of the IEEE Symposium on Security and Privacy 2022, San Francisco, CA, USA, 23–25 May 2022; pp. 596–613.
  • 91.
    Ke, P.; Zhang, L.F. Two-server private information retrieval with result verification. In Proceedings of the ISIT 2022, Espoo, Finland, 26 June–1 July 2022; pp. 408–413.
  • 92.
    Ke, P.; Zhang, L.F. Private information retrieval with result verification for more servers. In Proceedings of the ACNS 2023, Kyoto, Japan, 19–22 June 2023; pp. 197–216.
  • 93.
    Kruglik, S.; Dau, S.H.; Kiah, H.M.; et al. Querying twice to achieve information-theoretic verifiability in private information retrieval. IEEE Trans. Inf. Forensics Secur. 2024, 19, 8172–8187.
  • 94.
    Eriguchi, R.; Kurosawa, K.; Nuida, K. Multi-server PIR with full error detection and limited error correction. In Proceedings of the ITC 2022, Cambridge, MA, USA, 23–30 September 2022.
  • 95.
    Colombo, S.; Nikitin, K.; Corrigan-Gibbs, H.; et al. Authenticated private information retrieval. In Proceedings of the USENIX Security Symposium 2023, Anaheim, CA, USA, 9–11 August 2023; pp. 3835–3851.
  • 96.
    Dietz, M.; Tessaro, S. Fully malicious authenticated PIR. In Proceedings of the 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2024; pp. 113–147
  • 97.
    Gasarch, W.I. A survey on private information retrieval. Bull. EATCS 2004, 82, 72–107.
  • 98.
    Beimel, A. Private Information Retrieval: A primer. Available online: www.cs.bgu.ac.il /beimel/ Papers/PIRsurvey.ps (accessed on 11 August 2025).
  • 99.
    Blundo, C. Private Information Retrieval, Encyclopedia of Cryptography and Security; Springer Nature: Cham, Switzerland, 2011; pp. 974–976.
  • 100.
    Ostrovsky, R.; Skeith, W.E., III A survey of single-database private information retrieval: Techniques and Applications. Public Key Cryptogr. 2007, 393–411.
  • 101.
    Hedayat, A.S.; Sloane, N.J.A.; Stufken, J. Orthogonal Arrays: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 1999.
  • 102.

    Beimel, A.; Ishai, Y.; Kushilevitz, E.; et al. Breaking the O(n1/(2k−1)) barrier for information-theoretic private information retrieval. In Proceedings of the FOCS 2002, Vancouver, BC, Canada, 16–19 November 2002; pp. 61–270.

  • 103.
    Grolmusz, V. Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs. Combinatorica 2000, 20, 71–86
  • 104.
    Zhu, L.; Li,W.M.; Zhang, L.F. On the modulus in matching vector codes. Comput. J. 2022, 65, 2991–2997.
  • 105.
    Mann, E. Private Access to Distributed Information. Master’s Thesis, Technion-Israel Institute of Technology, Haifa, Israel, 1998.
  • 106.
    Dvir, Z.; Gopalan, P.; Yekhanin, S.; Matching vector codes. In Proceedings of the FOCS 2010, Las Vegas, NV, USA, 23–26 October 2010; pp. 705–714
  • 107.
    Bhowmick, A.; Dvir, Z.; Lovett, S. New bounds for matching vector families. In Proceedings of the STOC 2013, Palo Alto, CA, USA, 2–4 June 2013; pp. 823–832
  • 108.

    Chee, Y.M.; Ling, S.; Wang,H.; et al. Upper bounds on matching families in \(\mathbb{Z}_{pq}^n\). IEEE Trans. Inf. Theory 2013, 59, 5131–5139.

  • 109.
    Barkol, O.; Ishai,Y.; Weinreb, E. On locally decodable codes, self-correctable codes, and t-private PIR. In Proceedings of the APPROX-RANDOM 2007, Princeton, NJ, USA, 20–22 August 2007; pp. 311–325.
Share this article:
How to Cite
Zhang, L. A Unified Framework for Constructing Information-Theoretic Private Information Retrieval. Pragmatic Cybersecurity 2025, 1 (1), 3.
RIS
BibTex
Copyright & License
article copyright Image
Copyright (c) 2025 by the authors.