2020
DOI: 10.1007/978-3-030-64375-1_18
|View full text |Cite
|
Sign up to set email alerts
|

On Computational Shortcuts for Information-Theoretic PIR

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 54 publications
0
2
0
Order By: Relevance
“…As far as we know, there is no research on how we improve a protocol in domain-restricted setting in the literature of general secure computation. On the other hand, in the literature of private information retrieval (PIR) [13], Hong et al [14] showed that the computation cost can be reduced when a database has a structure, that is, the domain of a database is restricted.…”
Section: Restriction Of Domainmentioning
confidence: 99%
“…As far as we know, there is no research on how we improve a protocol in domain-restricted setting in the literature of general secure computation. On the other hand, in the literature of private information retrieval (PIR) [13], Hong et al [14] showed that the computation cost can be reduced when a database has a structure, that is, the domain of a database is restricted.…”
Section: Restriction Of Domainmentioning
confidence: 99%
“…Extremal set theory deals with determining the size of set-systems that satisfy certain restrictions. It is one of the most rapidly developing areas in combinatorics, with applications in various other branches of mathematics and theoretical computer science, including functional analysis, probability theory, circuit complexity, cryptography, coding theory, probabilistic methods, discrete geometry, linear algebra, spectral graph theory, ergodic theory, and harmonic analysis [38,39,107,106,112,319,196,278,276,255,45,307,297,132,149,160]. For more details on extremal set theory, we refer the reader to the book by Gerbner and Patkos [139]; for probabilistic arguments/proofs, see the books by Bollobás [52] and Spencer [284].…”
Section: Maximally Cover-free At Most T-intersecting K-uniform Familiesmentioning
confidence: 99%