Private Information Retrieval is Graph Based Replication Systems
暂无分享,去创建一个
[1] M. Murty. Ramanujan Graphs , 1965 .
[2] László Babai,et al. A short proof of the nonuniform Ray-Chaudhuri-Wilson inequality , 1988, Comb..
[3] Daniel A. Spielman,et al. Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[4] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[5] Felix Lazebnik,et al. On Hypergraphs of Girth Five , 2003, Electron. J. Comb..
[6] Sergey Yekhanin,et al. Locally Decodable Codes and Private Information Retrieval Schemes , 2010, Information Security and Cryptography.
[7] Kannan Ramchandran,et al. Fractional repetition codes for repair in distributed storage systems , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[8] Daniela Kühn,et al. Loose Hamilton cycles in hypergraphs , 2008, Discret. Math..
[9] Ervin Györi,et al. Hypergraphs with no cycle of length 4 , 2012, Discret. Math..
[10] Sriram Vishwanath,et al. Explicit MBR all-symbol locality codes , 2013, 2013 IEEE International Symposium on Information Theory.
[11] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[12] Zeev Dvir,et al. 2-Server PIR with Sub-Polynomial Communication , 2014, STOC.
[13] David Ellis,et al. On Regular Hypergraphs of High Girth , 2013, Electron. J. Comb..
[14] Kannan Ramchandran,et al. One extra bit of download ensures perfectly private information retrieval , 2014, 2014 IEEE International Symposium on Information Theory.
[15] Eitan Yaakobi,et al. PIR with Low Storage Overhead: Coding instead of Replication , 2015, ArXiv.
[16] Natalia Silberstein,et al. Optimal Fractional Repetition Codes Based on Graphs and Designs , 2014, IEEE Transactions on Information Theory.
[17] Zeev Dvir,et al. 2-Server PIR with Subpolynomial Communication , 2016, J. ACM.
[18] Salim El Rouayheb,et al. Private Information Retrieval From MDS Coded Data in Distributed Storage Systems , 2016, IEEE Transactions on Information Theory.
[19] Hua Sun,et al. The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.
[20] Tuvi Etzion,et al. PIR Array Codes with Optimal PIR Rate , 2016, ArXiv.
[21] Eitan Yaakobi,et al. Codes for graph erasures , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[22] PIR schemes with small download complexity and low storage requirements , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[23] Ravi Tandon,et al. Private Information Retrieval from Storage Constrained Databases - Coded Caching meets PIR , 2017, ArXiv.
[24] Eitan Yaakobi,et al. Codes for erasures over directed graphs , 2017, 2017 IEEE Information Theory Workshop (ITW).
[25] Camilla Hollanti,et al. Private Information Retrieval from Coded Databases with Colluding Servers , 2016, SIAM J. Appl. Algebra Geom..
[26] Camilla Hollanti,et al. Private information retrieval schemes for codec data with arbitrary collusion patterns , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).
[27] Tuvi Etzion,et al. PIR array codes with optimal PIR rates , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[28] Mikael Skoglund,et al. Symmetric private information retrieval for MDS coded distributed storage , 2016, 2017 IEEE International Conference on Communications (ICC).
[29] Hua Sun,et al. The Capacity of Private Information Retrieval with Disjoint Colluding Sets , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[30] Hua Sun,et al. Multiround Private Information Retrieval: Capacity and Storage Overhead , 2016, IEEE Transactions on Information Theory.
[31] Hua Sun,et al. The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.
[32] Sennur Ulukus,et al. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes , 2017, IEEE Transactions on Information Theory.
[33] Sennur Ulukus,et al. The Capacity of Private Information Retrieval From Coded Databases , 2016, IEEE Transactions on Information Theory.
[34] David A. Karpuk. Private Computation of Systematically Encoded Data with Colluding Servers , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[35] Sennur Ulukus,et al. Private Information Retrieval from Non-Replicated Databases , 2018, 2019 IEEE International Symposium on Information Theory (ISIT).
[36] Tuvi Etzion,et al. PIR Array Codes With Optimal Virtual Server Rate , 2016, IEEE Transactions on Information Theory.
[37] Syed Ali Jafar,et al. On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage , 2019, IEEE Transactions on Information Theory.
[38] Deepak Kumar,et al. The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases , 2018, IEEE Transactions on Information Theory.