2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849854
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Pliable Index Coding

Abstract: This paper studies a variant of the Pliable Index CODing (PICOD) problem, i.e., an index coding problem where a user can be satisfied by decoding any message that is not in its side information set, where communication is decentralized, i.e., it occurs among users rather than by the central server, and secure, i.e., each user is allowed to decode only one message outside its side information set and must not be able to collect any information about any other message that is not its decoded one. Given the diffi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The information theoretical converse was derived in [6] for the centralized case. The achievable scheme is the one for the decentralized PICOD without security constraint discussed in [4], which satisfies the security constraint because for each user, among all the messages that are involved in the encoding function, there is one and only one message that is not in its side information set. Therefore, the scheme is also information theoretically optimal with an additional security constraint.…”
Section: A Casementioning
confidence: 99%
See 2 more Smart Citations
“…The information theoretical converse was derived in [6] for the centralized case. The achievable scheme is the one for the decentralized PICOD without security constraint discussed in [4], which satisfies the security constraint because for each user, among all the messages that are involved in the encoding function, there is one and only one message that is not in its side information set. Therefore, the scheme is also information theoretically optimal with an additional security constraint.…”
Section: A Casementioning
confidence: 99%
“…Under linear encoding constraint, the minimum code-length of the decentralized IC is shown to be no more than twice that of its centralized counterpart [1]. The pliable version of decentralized IC was studied in [4], where information theoretical bounds on the optimal code-length were given for several cases. For the solved cases, the multiplicative gap between centralized and decentralized PICOD is usually much less than two.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Liu et al [24] extended this setup to a setting where the weak privacy constraint is required only against a subset of the messages not available to a user. Recently, some works [22], [23], [25] studied the notion of weak privacy for a variant of the index coding problem called the Pliable Index CODing (PICOD(t)) introduced by Brahma et al [26], where each user wants to obtain any t ≥ 1 messages that it does not have access to. Sasi et al [25] studied PICOD (1) with the privacy condition that each user is able to decode exactly one message outside its side information set for the special case of consecutive side information.…”
Section: Introductionmentioning
confidence: 99%
“…A generalization of [25] in terms of the form of the side information sets was investigated by Liu et al [22]. The authors further extended their study to a decentralized setting [23] where communication occurs among users rather than by a central server.…”
Section: Introductionmentioning
confidence: 99%