UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3
hits: 28
1.
  • Private Information Retriev... Private Information Retrieval From MDS Coded Data in Distributed Storage Systems
    Tajeddine, Razane; Gnilke, Oliver W.; El Rouayheb, Salim IEEE transactions on information theory, 11/2018, Volume: 64, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    The problem of providing privacy, in the private information retrieval (PIR) sense, to users requesting data from a distributed storage system (DSS), is considered. The DSS is coded by an ...
Full text

PDF
2.
  • Private Information Retriev... Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers
    Tajeddine, Razane; Gnilke, Oliver W.; Karpuk, David ... IEEE transactions on information theory, 06/2019, Volume: 65, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The problem of private information retrieval (PIR) from coded storage systems with colluding, Byzantine, and unresponsive servers is considered. An explicit scheme using an <inline-formula> <tex-math ...
Full text

PDF
3.
  • Straggler- and Adversary-To... Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes
    Byrne, Eimear; Gnilke, Oliver W; Kliewer, Jörg Entropy, 01/2023, Volume: 25, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Large matrix multiplications commonly take place in large-scale machine-learning applications. Often, the sheer size of these matrices prevent carrying out the multiplication at a single server. ...
Full text
4.
  • Efficient Recovery of a Sha... Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR
    Li, Jie; Makkonen, Okko; Hollanti, Camilla ... IEEE journal on selected areas in communications, 03/2022, Volume: 40, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    This work considers the problem of privately outsourcing the computation of a matrix product over a finite field <inline-formula> <tex-math notation="LaTeX">{\mathbb {F}}_{q} ...
Full text

PDF
5.
  • Well-Rounded Lattices: Towa... Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels
    Damir, Mohamed Taoufiq; Karrila, Alex; Amoros, Laia ... IEEE transactions on information theory, 06/2021, Volume: 67, Issue: 6
    Journal Article
    Peer reviewed

    The design of lattice coset codes for wiretap channels is considered. Bounds on the eavesdropper's correct decoding probability and information leakage are first revisited. From these bounds, it is ...
Full text

PDF
6.
Full text

PDF
7.
  • t-private information retri... t-private information retrieval schemes using transitive codes
    Freij-Hollanti, Ragnar; Gnilke, Oliver W.; Hollanti, Camilla ... IEEE transactions on information theory, 2019-April, 2019-4-00, Volume: 65, Issue: 4
    Journal Article
    Peer reviewed

    Private information retrieval (PIR) schemes for coded storage with colluding servers are presented, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear ...
Full text

PDF
8.
  • Improved user-private infor... Improved user-private information retrieval via finite geometry
    Gnilke, Oliver W.; Greferath, Marcus; Hollanti, Camilla ... Designs, codes, and cryptography, 15/3, Volume: 87, Issue: 2-3
    Journal Article
    Peer reviewed
    Open access

    In a user-private information retrieval (UPIR) scheme, a set of users collaborate to retrieve files from a database without revealing to observers which participant in the scheme requested the file. ...
Full text

PDF
9.
Full text
10.
Full text
1 2 3
hits: 28

Load filters