The Capacity of Private Information Retrieval
暂无分享,去创建一个
[1] Hua Sun,et al. The Capacity of Private Information Retrieval , 2017, IEEE Transactions on Information Theory.
[2] Hua Sun,et al. Blind interference alignment for private information retrieval , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[3] Eitan Yaakobi,et al. Codes for distributed PIR with low storage overhead , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[4] Wonjae Shin,et al. Dynamic supersymbol design of blind interference alignment for K-user MISO broadcast channels , 2015, 2015 IEEE International Conference on Communications (ICC).
[5] Hirosuke Yamamoto,et al. Private information retrieval for coded storage , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).
[6] Arya Mazumdar,et al. Storage Capacity of Repairable Networks , 2014, IEEE Transactions on Information Theory.
[7] Zeev Dvir,et al. 2-Server PIR with Sub-Polynomial Communication , 2014, STOC.
[8] Wei Zhang,et al. Blind Interference Alignment With Diversity in $K$-User Interference Channels , 2014, IEEE Transactions on Communications.
[9] Kannan Ramchandran,et al. One extra bit of download ensures perfectly private information retrieval , 2014, 2014 IEEE International Symposium on Information Theory.
[10] Hua Sun,et al. Index Coding Capacity: How Far Can One Go With Only Shannon Inequalities? , 2013, IEEE Transactions on Information Theory.
[11] Syed Ali Jafar,et al. Topological Interference Management Through Index Coding , 2013, IEEE Transactions on Information Theory.
[12] Yuval Ishai,et al. Share Conversion and Private Information Retrieval , 2012, 2012 IEEE 27th Conference on Computational Complexity.
[13] Syed Ali Jafar,et al. Blind Interference Alignment , 2012, IEEE Journal of Selected Topics in Signal Processing.
[14] Cheng Huang,et al. On the Locality of Codeword Symbols , 2011, IEEE Transactions on Information Theory.
[15] Sergey Yekhanin,et al. Locally Decodable Codes and Private Information Retrieval Schemes , 2010, Information Security and Cryptography.
[16] Yunnan Wu,et al. A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.
[17] Zhengdao Wang,et al. On the Degrees of Freedom Regions of Two-User MIMO Z and Full Interference Channels with Reconfigurable Antennas , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[18] Syed Ali Jafar,et al. Aiming Perfectly in the Dark-Blind Interference Alignment Through Staggered Antenna Switching , 2010, IEEE Transactions on Signal Processing.
[19] Alexander Sprintson,et al. On the Index Coding Problem and Its Relation to Network Coding and Matroid Theory , 2008, IEEE Transactions on Information Theory.
[20] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[21] Ziv Bar-Yossef,et al. Index Coding With Side Information , 2006, IEEE Transactions on Information Theory.
[22] Yitzhak Birk,et al. Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients , 2006, IEEE Transactions on Information Theory.
[23] Søren Riis,et al. Information flows, graphs and their guessing numbers , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.
[24] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[25] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[26] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[27] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[28] Jeffrey Scott Vitter,et al. Proceedings of the thirtieth annual ACM symposium on Theory of computing , 1998, STOC 1998.
[29] Yitzhak Birk,et al. Informed-source coding-on-demand (ISCOD) over broadcast channels , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[30] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[31] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[32] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[33] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[34] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[35] Adi Shamir,et al. How to share a secret , 1979, CACM.
[36] W. Gasarch. A Survey on Private Information Retrieval , 2004 .
[37] A. Aho. Proceedings of the nineteenth annual ACM symposium on Theory of computing , 1987, STOC 1987.