메뉴 건너뛰기




Volumn 58, Issue 4, 2010, Pages 831-859

On locally decodable codes, self-correctable codes, and t-private PIR

Author keywords

Combinatorial designs; Hamada's conjecture; Locally decodable codes; Private information retrieval; Reed muller codes; Self correctable codes; T privacy

Indexed keywords

COMBINATORIAL DESIGN; HAMADA'S CONJECTURE; LOCALLY-DECODABLE CODES; PRIVATE INFORMATION RETRIEVAL; REED-MULLER CODES; SELF CORRECTABLE CODES; T-PRIVACY;

EID: 78149358428     PISSN: 01784617     EISSN: 14320541     Source Type: Journal    
DOI: 10.1007/s00453-008-9272-1     Document Type: Conference Paper
Times cited : (15)

References (43)
  • 1
    • 78149360960 scopus 로고
    • Logical design with three-input majority gates
    • Akers, S., Robbins, T.: Logical design with three-input majority gates. Comput. Des. 12-27 (1963)
    • (1963) Comput. Des. , pp. 12-27
    • Akers, S.1    Robbins, T.2
  • 3
    • 0031651077 scopus 로고    scopus 로고
    • Probabilistic checking of proofs: A new characterization of NP
    • Preliminary version in FOCS'92
    • Arora, S., Safra, S.: Probabilistic checking of proofs: a new characterization of NP. J. ACM 45(1), 70-122 (1998). Preliminary version in FOCS'92
    • (1998) J. ACM , vol.45 , Issue.1 , pp. 70-122
    • Arora, S.1    Safra, S.2
  • 4
    • 0032058198 scopus 로고    scopus 로고
    • Proof verification and the hardness of approximation problems
    • Preliminary version in FOCS'92
    • Arora, S., Lund, C., Motwani, R., Sudan, M., Szegedy, M.: Proof verification and the hardness of approximation problems. J. ACM 45(3), 501-555 (1998). Preliminary version in FOCS'92
    • (1998) J. ACM , vol.45 , Issue.3 , pp. 501-555
    • Arora, S.1    Lund, C.2    Motwani, R.3    Sudan, M.4    Szegedy, M.5
  • 6
    • 0142255894 scopus 로고    scopus 로고
    • Designs and codes: An update
    • Assmus, E. F., Key, J. D.: Designs and codes: An update. Des. Codes Cryptogr. 9(1), 7-27 (1996)
    • (1996) Des. Codes Cryptogr , vol.9 , Issue.1 , pp. 7-27
    • Assmus, E.F.1    Key, J.D.2
  • 8
    • 0001338853 scopus 로고
    • BPP Has subexponential time simulations unless EXPTIME has publishable proofs
    • Babai, L., Fortnow, L., Nisan, N., Wigderson, A.: BPP Has subexponential time simulations unless EXPTIME has publishable proofs. Comput. Complex. 3, 307-318 (1993)
    • (1993) Comput. Complex , vol.3 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 11
    • 21144453606 scopus 로고    scopus 로고
    • General constructions for information-theoretic private information retrieval
    • Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2), 213-247 (2005)
    • (2005) J. Comput. Syst. Sci. , vol.71 , Issue.2 , pp. 213-247
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3
  • 13
    • 0003723775 scopus 로고    scopus 로고
    • 2nd edn. Cambridge University Press, Cambridge
    • Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vol. 1, 2nd edn. Cambridge University Press, Cambridge (1999)
    • (1999) Design Theory , vol.1
    • Beth, T.1    Jungnickel, D.2    Lenz, H.3
  • 14
    • 0029214558 scopus 로고
    • Designing programs that check their work
    • Blum, M., Kannan, S.: Designing programs that check their work. J. ACM 42(1), 269-291 (1995)
    • (1995) J. ACM , vol.42 , Issue.1 , pp. 269-291
    • Blum, M.1    Kannan, S.2
  • 15
    • 0000460625 scopus 로고    scopus 로고
    • Minimum weight and dimension formulas for some geometric codes
    • Calkin, N. J., Key, J. D., De Resmini, M. J.: Minimum weight and dimension formulas for some geometric codes. Des. Codes Cryptogr. 17, 105-120 (1999)
    • (1999) Des. Codes Cryptogr , vol.17 , pp. 105-120
    • Calkin, N.J.1    Key, J.D.2    De Resmini, M.J.3
  • 19
    • 0012523350 scopus 로고    scopus 로고
    • Universal service-providers for private information retrieval
    • Preliminary version in PODC'98
    • Di-Crescenzo, G., Ishai, Y., Ostrovsky, R.: Universal service-providers for private information retrieval. J. Cryptol. 14(1), 37-74 (2001). Preliminary version in PODC'98
    • (2001) J. Cryptol , vol.14 , Issue.1 , pp. 37-74
    • Di-Crescenzo, G.1    Ishai, Y.2    Ostrovsky, R.3
  • 20
    • 0034271895 scopus 로고    scopus 로고
    • Minimum-weight codewords as generators of generalized Reed-Muller codes
    • Ding, P., Key, J.: Minimum-weight codewords as generators of generalized Reed-Muller codes. IEEE Trans. Inf. Theory 46, 2152-2158 (2000)
    • (2000) IEEE Trans. Inf. Theory , vol.46 , pp. 2152-2158
    • Ding, P.1    Key, J.2
  • 21
    • 0030100766 scopus 로고    scopus 로고
    • Interactive proofs and the hardness of approximating cliques
    • Preliminary version in FOCS'91
    • Feige, U., Goldwasser, S., Lovasz, L., Safra, S., Szegedy, M.: Interactive proofs and the hardness of approximating cliques. J. ACM 43(2), 268-292 (1996). Preliminary version in FOCS'91
    • (1996) J. ACM , vol.43 , Issue.2 , pp. 268-292
    • Feige, U.1    Goldwasser, S.2    Lovasz, L.3    Safra, S.4    Szegedy, M.5
  • 22
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval
    • See
    • Gasarch, W.: A survey on private information retrieval. Bull. Eur. Assoc. Theor. Comput. Sci. 82, 72-107 (2004). See http://www.cs.umd.edu/~gasarch/pir/ pir.html for updates
    • (2004) Bull. Eur. Assoc. Theor. Comput. Sci. , vol.82 , pp. 72-107
    • Gasarch, W.1
  • 23
    • 84972522455 scopus 로고
    • On the p-rank of the incidence matrix of a balanced or partially balanced incomplete block design and its application to error-correcting codes
    • Hamada, N.: On the p-rank of the incidence matrix of a balanced or partially balanced incomplete block design and its application to error-correcting codes. Hiroshima Math. J. 3, 153-226 (1973)
    • (1973) Hiroshima Math. J. , vol.3 , pp. 153-226
    • Hamada, N.1
  • 24
    • 25444521247 scopus 로고
    • The geometric structure and the p-rank of an affine triple system derived from a nonassociative moufang loop with the maximum associative center
    • Hamada, N.: The geometric structure and the p-rank of an affine triple system derived from a nonassociative moufang loop with the maximum associative center. J. Comb. Theory Ser. A 30(3), 285-297 (1981)
    • (1981) J. Comb. Theory Ser. A , vol.30 , Issue.3 , pp. 285-297
    • Hamada, N.1
  • 25
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • Hirt, M., Maurer, U. M.: Player simulation and general adversary structures in perfect multiparty computation. J. Cryptol. 13(1), 31-60 (2000)
    • (2000) J. Cryptol , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.M.2
  • 27
    • 33748114725 scopus 로고    scopus 로고
    • On the hardness of information-theoretic multiparty computation
    • Ishai, Y., Kushilevitz, E.: On the hardness of information-theoretic multiparty computation. In: Proc. EUROCRYPT, pp. 439-455 (2004)
    • (2004) Proc. EUROCRYPT , pp. 439-455
    • Ishai, Y.1    Kushilevitz, E.2
  • 29
    • 4544225791 scopus 로고    scopus 로고
    • Exponential lower bound for 2-query locally decodable codes
    • Preliminary version in STOC'03
    • Kerenidis, I., de Wolf, R.: Exponential lower bound for 2-query locally decodable codes. J. Comput. Syst. Sci. 395-420 (2004). Preliminary version in STOC'03
    • (2004) J. Comput. Syst. Sci. , pp. 395-420
    • Kerenidis, I.1    De Wolf, R.2
  • 35
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 36
    • 0035276434 scopus 로고    scopus 로고
    • Pseudorandom generators without the XOR lemma
    • Preliminary version in STOC'99
    • Sudan, M., Trevisan, L., Vadhan, S. P.: Pseudorandom generators without the XOR lemma. J. Comput. Syst. Sci. 62(2), 236-266 (2001). Preliminary version in STOC'99
    • (2001) J. Comput. Syst. Sci. , vol.62 , Issue.2 , pp. 236-266
    • Sudan, M.1    Trevisan, L.2    Vadhan, S.P.3
  • 37
    • 0009140643 scopus 로고    scopus 로고
    • Linear perfert codes and a characterization of the classical designs
    • Tonchev, V. D.: Linear perfert codes and a characterization of the classical designs. Des. Codes Cryptogr. 17, 121-128 (1999)
    • (1999) Des. Codes Cryptogr , vol.17 , pp. 121-128
    • Tonchev, V.D.1
  • 38
    • 33748588052 scopus 로고    scopus 로고
    • Some applications of coding theory in computational complexity
    • Trevisan, L.: Some applications of coding theory in computational complexity. Quad. Mat. 13, 347-424 (2004).
    • (2004) Quad. Mat. , vol.13 , pp. 347-424
    • Trevisan, L.1
  • 39
    • 78149361938 scopus 로고    scopus 로고
    • Also available as
    • Also available as ECCC Report No. 43(2004)
    • (2004) ECCC Report No. 43


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.