The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on Information …, 2022 - dl.acm.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns

J Cheng, N Liu, W Kang - arXiv e-prints, 2020 - ui.adsabs.harvard.edu
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

[PDF][PDF] The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns

J Cheng, N Liu, W Kang - arXiv preprint arXiv:2010.08249, 2020 - researchgate.net
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

[引用][C] The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on Information …, 2022 - cir.nii.ac.jp
The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and
Eavesdropping Patterns | CiNii Research CiNii 国立情報学研究所 学術情報ナビゲータ[サイニィ] …

The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns

J Cheng, N Liu, W Kang - arXiv preprint arXiv:2010.08249, 2020 - arxiv.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …