{"id":"https://openalex.org/W7148345607","doi":"https://doi.org/10.48550/arxiv.2604.00411","title":"Efficient DPF-based Error-Detecting Information-Theoretic Private Information Retrieval Over Rings","display_name":"Efficient DPF-based Error-Detecting Information-Theoretic Private Information Retrieval Over Rings","publication_year":2026,"publication_date":"2026-04-01","ids":{"openalex":"https://openalex.org/W7148345607","doi":"https://doi.org/10.48550/arxiv.2604.00411"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00411","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00411","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00411","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046626765","display_name":"Pengzhen Ke","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ke, Pengzhen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132792174","display_name":"Liang Feng Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Liang Feng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132817024","display_name":"Huaxiong Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Huaxiong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132803811","display_name":"Li-Ping Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Li-Ping","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046626765"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.821399986743927,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.821399986743927,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.06639999896287918,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.024900000542402267,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.6054999828338623},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5753999948501587},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5446000099182129},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5227000117301941},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.504800021648407},{"id":"https://openalex.org/keywords/rendering","display_name":"Rendering (computer graphics)","score":0.49390000104904175},{"id":"https://openalex.org/keywords/data-retrieval","display_name":"Data retrieval","score":0.4805999994277954},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.39340001344680786},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.38929998874664307}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7889999747276306},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.6054999828338623},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5753999948501587},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5446000099182129},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5227000117301941},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.504800021648407},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.49390000104904175},{"id":"https://openalex.org/C551230270","wikidata":"https://www.wikidata.org/wiki/Q4368942","display_name":"Data retrieval","level":2,"score":0.4805999994277954},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40149998664855957},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.38929998874664307},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3853999972343445},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3571000099182129},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.35679998993873596},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35440000891685486},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3513999879360199},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.30559998750686646},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2978000044822693},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2896000146865845},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C116425068","wikidata":"https://www.wikidata.org/wiki/Q4686695","display_name":"Adversarial information retrieval","level":5,"score":0.2750000059604645},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C2992444157","wikidata":"https://www.wikidata.org/wiki/Q775079","display_name":"Single point","level":3,"score":0.25589999556541443},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00411","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00411","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00411","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00411","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5491722822189331}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Authenticated":[0],"private":[1,9,141],"information":[2,10,142],"retrieval":[3,11,150],"(APIR)":[4],"is":[5],"the":[6,81,101],"state-of-the-art":[7],"error-detecting":[8],"(ED-PIR),":[12],"using":[13],"Distributed":[14],"Point":[15],"Functions":[16],"(DPFs)":[17],"for":[18,53,104,137,147],"subpolynomial":[19],"complexity":[20],"and":[21,99,155],"privacy.":[22],"However,":[23],"its":[24,43,51],"finite":[25],"field":[26],"structure":[27],"restricts":[28],"it":[29],"to":[30,34,88],"prime-order":[31],"DPFs,":[32],"leading":[33],"prohibitively":[35],"large":[36],"key":[37,96],"sizes":[38],"under":[39],"information-theoretic":[40,62,73],"settings,":[41],"while":[42],"dual-DPF-key":[44],"design":[45,110],"introduces":[46],"unnecessary":[47],"communication":[48,113],"overhead,":[49],"limiting":[50],"practicality":[52],"large-scale":[54],"deployments.":[55],"This":[56],"paper":[57],"proposes":[58],"a":[59,78,108,133],"novel":[60],"ring-based":[61],"ED-PIR":[63],"(itED-PIR)":[64],"scheme":[65,83,102],"that":[66],"overcomes":[67],"these":[68],"limitations":[69],"by":[70,115],"leveraging":[71],"prime-power-order":[72],"DPFs":[74],"(itDPFs).":[75],"Built":[76],"over":[77],"prime-power":[79],"ring,":[80],"proposed":[82],"breaks":[84],"APIR's":[85,117],"field-induced":[86],"constraint":[87],"enable":[89],"more":[90],"efficient":[91],"DPF":[92],"utilization,":[93],"significantly":[94],"reducing":[95],"size":[97],"growth":[98],"rendering":[100],"feasible":[103],"high-security":[105],"scenarios.":[106],"Additionally,":[107],"single-itDPF-key":[109],"halves":[111],"query-side":[112],"overhead":[114],"eliminating":[116],"redundant":[118],"dual-key":[119],"setup,":[120],"without":[121],"compromising":[122],"privacy":[123,157],"or":[124],"verifiability.":[125],"Beyond":[126],"immediate":[127],"efficiency":[128],"gains,":[129],"this":[130],"work":[131],"establishes":[132],"lightweight,":[134],"flexible":[135],"framework":[136],"constructing":[138],"DPF-based":[139],"malicious-resilient":[140],"retrieval,":[143],"opening":[144],"new":[145],"avenues":[146],"privacy-preserving":[148],"data":[149],"in":[151],"distributed":[152],"storage":[153],"systems":[154],"post-quantum":[156],"protocols.":[158]},"counts_by_year":[],"updated_date":"2026-04-03T16:44:17.987007","created_date":"2026-04-03T00:00:00"}
