Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes
暂无分享,去创建一个
Hsuan-Yin Lin | Siddhartha Kumar | Eirik Rosnes | Alexandre Graell i Amat | A. Graell i Amat | E. Rosnes | Hsuan-Yin Lin | Siddhartha Kumar
[1] Jennifer D. Key,et al. Information sets and partial permutation decoding for codes from finite geometries , 2006, Finite Fields Their Appl..
[2] Gennian Ge,et al. Multi-file Private Information Retrieval from MDS Coded Databases with Colluding Servers , 2017, ArXiv.
[3] Kannan Ramchandran,et al. One extra bit of download ensures perfectly private information retrieval , 2014, 2014 IEEE International Symposium on Information Theory.
[4] Hirosuke Yamamoto,et al. Private information retrieval for coded storage , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).
[5] Tor Helleseth,et al. On the minimum distance of array codes as LDPC codes , 2003, IEEE Trans. Inf. Theory.
[6] Dimitris S. Papailiopoulos,et al. XORing Elephants: Novel Erasure Codes for Big Data , 2013, Proc. VLDB Endow..
[7] Hua Sun,et al. The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.
[8] Mikael Skoglund,et al. Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers , 2017, 2017 IEEE Information Theory Workshop (ITW).
[9] P. Vijay Kumar,et al. Codes With Local Regeneration and Erasure Correction , 2014, IEEE Transactions on Information Theory.
[10] Irving S. Reed,et al. A class of multiple-error-correcting codes and the decoding scheme , 1954, Trans. IRE Prof. Group Inf. Theory.
[11] Sennur Ulukus,et al. The Capacity of Private Information Retrieval From Coded Databases , 2016, IEEE Transactions on Information Theory.
[12] Mikael Skoglund,et al. On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers , 2019, IEEE Transactions on Information Theory.
[13] W. Cary Huffman,et al. Fundamentals of Error-Correcting Codes , 1975 .
[14] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[15] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[16] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[17] A. Ashikhmin. Generalized Hamming Weights for &-Linear Codes , 2015 .
[18] Shu-Tao Xia,et al. Constructions of Optimal Binary Locally Repairable Codes With Multiple Repair Groups , 2016, IEEE Communications Letters.
[19] Camilla Hollanti,et al. Reed-Muller Codes for Private Information Retrieval , 2017 .
[20] Jean-Marie Goethals,et al. On Generalized Reed-Muller Codes and Their Relatives , 1970, Inf. Control..
[21] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[22] Mikael Skoglund,et al. Secure symmetric private information retrieval from colluding databases with adversaries , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[23] Klim Efremenko,et al. 3-Query Locally Decodable Codes of Subexponential Length , 2008 .
[24] Itzhak Tamo,et al. Optimal Repair of Reed-Solomon Codes: Achieving the Cut-Set Bound , 2017, 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS).
[25] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[26] Rafail Ostrovsky,et al. Batch codes and their applications , 2004, STOC '04.
[27] Eitan Yaakobi,et al. Codes for distributed PIR with low storage overhead , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[28] Camilla Hollanti,et al. $t$ -Private Information Retrieval Schemes Using Transitive Codes , 2017, IEEE Transactions on Information Theory.
[29] Salim El Rouayheb,et al. Lifting Private Information Retrieval from Two to any Number of Messages , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[30] Jehoshua Bruck,et al. EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures , 1995, IEEE Trans. Computers.
[31] Cheng Huang,et al. Erasure Coding in Windows Azure Storage , 2012, USENIX Annual Technical Conference.
[32] Gennian Ge,et al. A general private information retrieval scheme for MDS coded databases with colluding servers , 2017, Designs, Codes and Cryptography.
[33] C. Feyling. Punctured maximum distance separable codes , 1993 .
[34] Salim El Rouayheb,et al. Private Information Retrieval From MDS Coded Data in Distributed Storage Systems , 2016, IEEE Transactions on Information Theory.
[35] Gennian Ge,et al. Private Information Retrieval from MDS Coded Databases with Colluding Servers under Several Variant Models , 2017, 1705.03186.
[36] Charles R. Johnson,et al. Matrix Analysis, 2nd Ed , 2012 .
[37] Hua Sun,et al. Private Information Retrieval from MDS Coded Data With Colluding Servers: Settling a Conjecture by Freij-Hollanti et al. , 2018, IEEE Transactions on Information Theory.
[38] Alexandre Graell i Amat,et al. Private information retrieval in distributed storage systems using an arbitrary linear code , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[39] Sergey Yekhanin,et al. Towards 3-query locally decodable codes of subexponential length , 2008, JACM.
[40] Camilla Hollanti,et al. Private Information Retrieval from Coded Databases with Colluding Servers , 2016, SIAM J. Appl. Algebra Geom..
[41] E. Kushilevitz,et al. Barrier for Information-Theoretic Private Information Retrieval , 2002 .
[42] Marcel Ambroze,et al. On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes , 2012, IEEE Transactions on Information Theory.
[43] Hua Sun,et al. The Capacity of Private Information Retrieval , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[44] Minghua Chen,et al. Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).
[45] Hua Sun,et al. The Capacity of Symmetric Private Information Retrieval , 2019, IEEE Transactions on Information Theory.
[46] Itzhak Tamo,et al. A Family of Optimal Locally Recoverable Codes , 2013, IEEE Transactions on Information Theory.
[47] Itzhak Tamo,et al. A family of optimal locally recoverable codes , 2014, ISIT.