On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers
暂无分享,去创建一个
[1] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[2] Muriel Medard,et al. Network coding : fundamentals and applications , 2012 .
[3] Camilla Hollanti,et al. Private Information Retrieval from Coded Databases with Colluding Servers , 2016, SIAM J. Appl. Algebra Geom..
[4] Eitan Yaakobi,et al. PIR with Low Storage Overhead: Coding instead of Replication , 2015, ArXiv.
[5] Sennur Ulukus,et al. The Capacity of Private Information Retrieval From Coded Databases , 2016, IEEE Transactions on Information Theory.
[6] Hua Sun,et al. The Capacity of Robust Private Information Retrieval With Colluding Databases , 2016, IEEE Transactions on Information Theory.
[7] Kannan Ramchandran,et al. One extra bit of download ensures perfectly private information retrieval , 2014, 2014 IEEE International Symposium on Information Theory.
[8] Hirosuke Yamamoto,et al. Private information retrieval for coded storage , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).
[9] Kannan Ramchandran,et al. Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks , 2010, IEEE Transactions on Information Theory.
[10] Hua Sun,et al. The Capacity of Symmetric Private Information Retrieval , 2019, IEEE Transactions on Information Theory.
[11] Salim El Rouayheb,et al. Private Information Retrieval From MDS Coded Data in Distributed Storage Systems , 2016, IEEE Transactions on Information Theory.
[12] Hua Sun,et al. The Capacity of Private Information Retrieval , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[13] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Sennur Ulukus,et al. Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes , 2017, IEEE Transactions on Information Theory.
[15] Mikael Skoglund,et al. The Capacity of Private Information Retrieval With Eavesdroppers , 2018, IEEE Transactions on Information Theory.
[16] Lang Tong,et al. Polytope codes against adversaries in networks , 2010, ISIT.
[17] Mikael Skoglund,et al. Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers , 2017, 2017 IEEE Information Theory Workshop (ITW).
[18] Sennur Ulukus,et al. The Capacity of Private Information Retrieval from Byzantine and Colluding Databases , 2017, IEEE Transactions on Information Theory.
[19] Mikael Skoglund,et al. The Capacity of Private Information Retrieval with Eavesdroppers , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.
[20] Mikael Skoglund,et al. Symmetric private information retrieval for MDS coded distributed storage , 2016, 2017 IEEE International Conference on Communications (ICC).
[21] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.