2019
DOI: 10.48550/arxiv.1901.05809
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On Pliable Index Coding

Abstract: A new variant of index coding problem termed as Pliable Index Coding Problem (PICOD) is formulated in [S.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…The secure IC problem was first proposed in [7], where private one-time-pad keys were used to meet the security demand. A weaker definition of security which can be achieved without security keys has also been discussed in [7] and has been extended to PICOD setting [8]. Achievable and converse bounds for the case of circular side information structure and linear encoding were derived in [5].…”
Section: Introductionmentioning
confidence: 99%
“…The secure IC problem was first proposed in [7], where private one-time-pad keys were used to meet the security demand. A weaker definition of security which can be achieved without security keys has also been discussed in [7] and has been extended to PICOD setting [8]. Achievable and converse bounds for the case of circular side information structure and linear encoding were derived in [5].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, in [8], the Authors extended the private IC problem in [7] to the PICOD framework. Only the case where the side information structure is "circular", and where each user can decode one and only one message was considered in [8].…”
Section: Introductionmentioning
confidence: 99%
“…The first condition is a special case of the "circular-arc network topology hypergraph" class of PICOD studied in [6], for which an optimal solution was given without the privacy constraint. The second condition was first studied in [8] and was motivated by the need to keep content privacy is some distribution networks.This paper proposes both converse and achievable bounds. The proposed achievable scheme not only strictly outperforms the one in [8] for some values of the system parameters, but it is also information theoretically optimal in some settings.…”
mentioning
confidence: 99%
See 2 more Smart Citations