In this editorial survey we introduce the special issue of the journal
C...
Linear computations over quantum many-to-one communication networks offe...
In this paper, we propose a novel construction for secure distributed ma...
The Gram matrix of a matrix A is defined as AA^T (or A^TA). Computing
th...
In this paper, a general framework for linear secure distributed matrix
...
In this work, a flexible and robust private information retrieval (PIR)
...
This work considers the problem of distributing matrix multiplication ov...
In quantum private information retrieval (QPIR), a user retrieves a clas...
In this paper, we study the problem of distributed matrix multiplication...
This work considers the problem of privately outsourcing the computation...
In the classical private information retrieval (PIR) setup, a user wants...
A new computational private information retrieval (PIR) scheme based on
...
In the classical private information retrieval (PIR) setup, a user wants...
In the classical private information retrieval (PIR) setup, a user wants...
We define and analyze low-rank parity-check (LRPC) codes over extension ...
Private information retrieval (PIR) is the problem of privately retrievi...
In this letter, locally recoverable codes with maximal recoverability ar...
In this work, we first prove the capacity of coded, linear symmetric pri...
This paper presents a new alphabet-dependent bound for codes with
hierar...
A private information retrieval (PIR) scheme allows a user to retrieve a...
In this paper, the problem of providing privacy to users requesting data...
Locally repairable codes (LRC) have gained significant interest for the
...
The problem of Private Information Retrieval (PIR) from coded storage sy...
Recently, information-theoretic private information retrieval (PIR) from...
A private information retrieval (PIR) scheme on coded storage systems wi...
This paper presents private information retrieval (PIR) schemes for code...