2022
DOI: 10.1109/tit.2021.3130629
|View full text |Cite
|
Sign up to set email alerts
|

Private Index Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 26 publications
0
16
0
Order By: Relevance
“…Since any converse bound with no privacy requirement is also a converse bound with privacy. So, to prove the converse result, we need to show only the second inequality in (22) and in (21). Furthermore, observe that substituting N = 2 in the second inequality in (22) gives the second inequality in (21).…”
Section: E Tightness Of the Achievable Memory-rate Pairsmentioning
confidence: 99%
See 4 more Smart Citations
“…Since any converse bound with no privacy requirement is also a converse bound with privacy. So, to prove the converse result, we need to show only the second inequality in (22) and in (21). Furthermore, observe that substituting N = 2 in the second inequality in (22) gives the second inequality in (21).…”
Section: E Tightness Of the Achievable Memory-rate Pairsmentioning
confidence: 99%
“…So, to show the converse of Theorem 6, we prove that for N ≥ K = 2, any (M, R) pair under privacy satisfies the second inequality in (22). Full proof of the converse can be found in Subsection IV-F. Outline of achievability: To show the achievability of the region in (21), we use a particular non-private scheme from [34]. Using this particular non-private scheme, we can show that for any (M, R) pair in the region by (21), there exists an (2, 4, M, R)-D RS -non-private scheme.…”
Section: E Tightness Of the Achievable Memory-rate Pairsmentioning
confidence: 99%
See 3 more Smart Citations