2018 IEEE International Symposium on Information Theory (ISIT) 2018
DOI: 10.1109/isit.2018.8437729
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity of Uncoded Storage Constrained PIR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…All permutations are generated by the user and are not known to the servers. First, the single symbol a 1 12 is downloaded from Serv 1 . In fact, we download the symbol a 1 12 or a 2 12 depending on the random permutation.…”
Section: The Pir Scheme Withmentioning
confidence: 99%
See 4 more Smart Citations
“…All permutations are generated by the user and are not known to the servers. First, the single symbol a 1 12 is downloaded from Serv 1 . In fact, we download the symbol a 1 12 or a 2 12 depending on the random permutation.…”
Section: The Pir Scheme Withmentioning
confidence: 99%
“…First, the single symbol a 1 12 is downloaded from Serv 1 . In fact, we download the symbol a 1 12 or a 2 12 depending on the random permutation. Because of the requirement of message symmetry, b 1 12 is also requested and downloaded.…”
Section: The Pir Scheme Withmentioning
confidence: 99%
See 3 more Smart Citations