Private information retrieval with side information
We study the problem of Private Information Retrieval (PIR) in the presence of prior side
information. The problem setup includes a database of K independent messages possibly …
information. The problem setup includes a database of K independent messages possibly …
Fundamental limits of cache-aided private information retrieval with unknown and uncoded prefetching
We consider the problem of private information retrieval (PIR) from N non-colluding and
replicated databases when the user is equipped with a cache that holds an uncoded fraction …
replicated databases when the user is equipped with a cache that holds an uncoded fraction …
Fundamental limits of caching for demand privacy against colluding users
This article investigates the problem of demand privacy against colluding users for shared-
link coded caching systems, where no subset of users can learn any information about the …
link coded caching systems, where no subset of users can learn any information about the …
Fundamentals of index coding
Index coding is a canonical problem in network information theory that studies the
fundamental limit and optimal coding schemes for broadcasting multiple messages to …
fundamental limit and optimal coding schemes for broadcasting multiple messages to …
The capacity of private information retrieval with partially known private side information
We consider the problem of private information retrieval (PIR) of a single message out of
messages from replicated and non-colluding databases where a cache-enabled user …
messages from replicated and non-colluding databases where a cache-enabled user …
Subpacketization in coded caching with demand privacy
Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in
cached networks. One limitation of coded caching schemes is that they reveal the demands …
cached networks. One limitation of coded caching schemes is that they reveal the demands …
PIR schemes with small download complexity and low storage requirements
In the classical model for (information theoretically secure) Private Information Retrieval
(PIR) due to Chor, Goldreich, Kushilevitz and Sudan, a user wishes to retrieve one bit of a …
(PIR) due to Chor, Goldreich, Kushilevitz and Sudan, a user wishes to retrieve one bit of a …
Private index coding
We study the fundamental problem of index coding under an additional privacy constraint
that requires each receiver to learn nothing more about the collection of messages beyond …
that requires each receiver to learn nothing more about the collection of messages beyond …
Private pliable index coding
The Pliable Index CODing (PICOD) problem is a variant of the Index Coding (IC) problem,
where the desired messages by the users, who are equipped with message side …
where the desired messages by the users, who are equipped with message side …
On the capacity region for secure index coding
We study the index coding problem in the presence of an eavesdropper, where the aim is to
communicate without allowing the eavesdropper to learn any single message aside from the …
communicate without allowing the eavesdropper to learn any single message aside from the …