The Asymptotic Capacity of X-Secure T-Private Linear Computation with Graph Based Replicated Storage

H Jia, Z Jia - IEEE Transactions on Information Theory, 2024 - ieeexplore.ieee.org
We consider the problem of X-secure and T-private linear computation with graph based
replicated storage (GXSTPLC), which enables the user to privately retrieve a linear …

Byzantine-Eavesdropper Alliance: How to Achieve Symmetric Privacy in Quantum -Secure -Byzantine -Eavesdropped -Unresponsive -Colluding PIR?

M Nomeir, A Aytekin, S Ulukus - arXiv preprint arXiv:2412.06728, 2024 - arxiv.org
We consider the quantum\emph {symmetric} private information retrieval (QSPIR) problem in
a system with $ N $ databases and $ K $ messages, with $ U $ unresponsive servers, $ T …

Keyword-Based PIR Method for Enhancing Large-Scale Power Credit

Y Li, J Li, M Wang - 2024 43rd Chinese Control Conference …, 2024 - ieeexplore.ieee.org
Power credit reports are an important means of enhancing enterprises' credit. However,
there are two main problems in existing inquiry services. The first problem is that existing …