Secure aggregation usually aims at securely computing the sum of the inp...
In a typical formulation of the private information retrieval (PIR) prob...
Distributed Linearly Separable Computation problem under the cyclic
assi...
In secure summation, K users, each holds an input, wish to compute the s...
We consider the storage-retrieval rate tradeoff in private information
r...
A collection of K random variables are called (K,n)-MDS if any n of the
...
A storage code over a graph maps K independent source symbols, each of
L...
The secure summation problem is considered, where K users, each holds an...
Secure aggregation, which is a core component of federated learning,
agg...
A secure storage code maps K source symbols, each of L_w bits, to N
code...
Coded caching has been shown as a promissing method to reduce the networ...
Conditional disclosure of secrets (CDS) is the problem of disclosing as
...
The robust principles of treating interference as noise (TIN) when it is...
In the problem of cache-aided multiuser private information retrieval
(M...
Distributed linearly separable computation, where a user asks some
distr...
In the robust secure aggregation problem, a server wishes to learn and o...
In the conventional robust T-colluding private information retrieval (PI...
Coded Caching, proposed by Maddah-Ali and Niesen (MAN), has the potentia...
We consider the problem of cache-aided Multiuser Private Information
Ret...
This paper studies the distributed linearly separable computation proble...
Coded caching is a promising technique to smooth out network traffic by
...
This paper formulates a distributed computation problem, where a master ...
In the secure groupcast problem, a transmitter wants to securely groupca...
The compound secure groupcast problem is considered, where the key varia...
We consider a transmitter and K receivers, each of which shares a key
va...
In the conditional disclosure of secrets (CDS) problem, Alice and Bob (e...
Coded caching has the potential to greatly reduce network traffic by
lev...
We consider the secure computation problem in a minimal model, where Ali...
In the coded caching problem as originally formulated by Maddah-Ali and
...
In order to preserve the privacy of the users demands from other users, ...
The capacity of private information retrieval (PIR) from databases coded...
We consider constructing capacity-achieving linear codes with minimum me...
The two-user computation broadcast problem is introduced as the setting ...
A locally decodable code (LDC) maps K source symbols, each of size L_w
b...
The capacity of symmetric private information retrieval with K messages,...
We consider a K-user interference network with M states, where each
tran...
We propose a new capacity-achieving code for the private information
ret...
X-secure and T-private information retrieval (XSTPIR) is a form of
priva...
We introduce the problem of anonymous information delivery (AID), compri...
We consider the problem of private information retrieval (PIR) with coll...
We consider the communication scenario where K transmitters are each
con...