Linear Batch Codes
- 802 Downloads
In an application, where a client wants to obtain many symbols from a large database, it is often desirable to balance the load. Batch codes (introduced by Ishai et al. in STOC 2004) do exactly that: the large database is divided between many servers, so that the client has to only make a small number of queries to every server to obtain sufficient information to reconstruct all desired symbols.
In this work, we formalize the study of linear batch codes. These codes, in particular, are of potential use in distributed storage systems. We show that a generator matrix of a binary linear batch code is also a generator matrix of classical binary linear error-correcting code. This immediately yields that a variety of upper bounds, which were developed for error-correcting codes, are applicable also to binary linear batch codes. We also propose new methods for constructing large linear batch codes from the smaller ones.
KeywordsBatch codes Error-correcting codes Computationally-private information retrieval Load balancing Distributed storage
We thank Dominique Unruh for helpful discussions. The work of the authors is supported in part by the research grants PUT405 and IUT2-1 from the Estonian Research Council and by the European Regional Development Fund through the Estonian Center of Excellence in Computer Science, EXCS. The work of V. Skachek is also supported in part by the EU COST Action IC1104.
- 5.Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Symposium on Foundations of Computer Science (FOCS), Milwaukee, Wisconsin, USA pp. 41–50 (1995)Google Scholar
- 7.Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applications. In: Proceedings of the 36th ACM Symposium on Theory of Computing (STOC), Chicago (2004)Google Scholar
- 8.Kushilevitz, E., Ostrovsky, R.: Replication is NOT needed: SINGLE database, computationally-private information retrieval. In: Proceedings of the 38th Symposium on Foundations of Computer Science (FOCS), Miami Beach, Florida, USA pp. 364–373 (1997)Google Scholar
- 9.Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Proceedings of the International Conference on Information Security and Cryptology (ICISC), Seoul, South Korea pp. 193–210 (2009)Google Scholar
- 10.Lipmaa, H., Skachek, V.: Linear batch codes. Available online http://arxiv.org/abs/1404.2796
- 12.MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1978)Google Scholar
- 15.Silberstein, N., Gál, A.: Optimal combinatorial batch codes based on block designs. Available online http://arxiv.org/abs/1312.5505