Private retrieval, computing, and learning: Recent progress and future challenges
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
into a cyber notion of privacy on many functions that take place in the cyberspace. This …
The Capacity of T-Private Information Retrieval With Private Side Information
We consider the problem of T-Private Information Retrieval with private side information
(TPIR-PSI). In this problem, N replicated databases store K independent messages, and a …
(TPIR-PSI). In this problem, N replicated databases store K independent messages, and a …
Cross subspace alignment codes for coded distributed batch computation
The goal of coded distributed computation is to efficiently distribute a computation task, such
as matrix multiplication, N-linear computation, or multivariate polynomial evaluation, across …
as matrix multiplication, N-linear computation, or multivariate polynomial evaluation, across …
Information theoretic secure aggregation with user dropouts
In the robust secure aggregation problem, a server wishes to learn and only learn the sum of
the inputs of a number of users while some users may drop out (ie, may not respond). The …
the inputs of a number of users while some users may drop out (ie, may not respond). The …
X-Secure T-Private Information Retrieval From MDS Coded Storage With Byzantine and Unresponsive Servers
The problem of X-secure T-private information retrieval from MDS coded storage is studied
in this paper, where the user wishes to privately retrieve one out of K independent messages …
in this paper, where the user wishes to privately retrieve one out of K independent messages …
On the capacity and straggler-robustness of distributed secure matrix multiplication
Computationally efficient matrix multiplication is a fundamental requirement in various fields,
including and particularly in data analytics. To do so, the computation task of large-scale …
including and particularly in data analytics. To do so, the computation task of large-scale …
GCSA codes with noise alignment for secure coded multi-party batch matrix multiplication
A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the
goal is to allow a master to efficiently compute the pairwise products of two batches of …
goal is to allow a master to efficiently compute the pairwise products of two batches of …
The capacity of private information retrieval from heterogeneous uncoded caching databases
We consider private information retrieval (PIR) of a single file out of K files from N non-
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …
colluding databases with heterogeneous storage constraints m=(m 1,⋯, m N). The aim of this …
N-Sum Box: An Abstraction for Linear Computation over Many-to-one Quantum Networks
Linear computations over quantum many-to-one communication networks offer opportunities
for communication cost improvements through schemes that exploit quantum entanglement …
for communication cost improvements through schemes that exploit quantum entanglement …
Quantum symmetric private information retrieval with secure storage and eavesdroppers
We consider both the classical and quantum variations of X-secure, E-eavesdropped and T-
colluding symmetric private information retrieval (SPIR). This is the first work to study SPIR …
colluding symmetric private information retrieval (SPIR). This is the first work to study SPIR …