{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:10Z","timestamp":1740122530362,"version":"3.37.3"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T00:00:00Z","timestamp":1545350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["276031","282938"],"award-info":[{"award-number":["276031","282938"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["303819","283262"],"award-info":[{"award-number":["303819","283262"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["283437"],"award-info":[{"award-number":["283437"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011264","name":"FP7 People: Marie-Curie Actions","doi-asserted-by":"publisher","award":["291763"],"award-info":[{"award-number":["291763"]}],"id":[{"id":"10.13039\/100011264","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s10623-018-00591-9","type":"journal-article","created":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T01:50:51Z","timestamp":1545357051000},"page":"665-677","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved user-private information retrieval via finite geometry"],"prefix":"10.1007","volume":"87","author":[{"given":"Oliver W.","family":"Gnilke","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Greferath","sequence":"additional","affiliation":[]},{"given":"Camilla","family":"Hollanti","sequence":"additional","affiliation":[]},{"given":"Guillermo","family":"Nu\u00f1ez\u00a0Ponasso","sequence":"additional","affiliation":[]},{"given":"Padraig","family":"\u00d3\u00a0Cath\u00e1in","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Swartz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,21]]},"reference":[{"key":"591_CR1","unstructured":"Beimel A., Ishai Y., Kushilevitz E., Raymond J.\u00a0F.: Breaking the \n                    \n                      \n                    \n                    $$O(n^{1\/(2k-1)})$$\n                    \n                      \n                        \n                          O\n                          (\n                          \n                            n\n                            \n                              1\n                              \/\n                              (\n                              2\n                              k\n                              -\n                              1\n                              )\n                            \n                          \n                          )\n                        \n                      \n                    \n                   barrier for information-theoretic private information retrieval. In: Proceedings, FoCS 2002, pp. 261\u2013270 (2002)."},{"key":"591_CR2","unstructured":"Beth T., Jungnickel D., Lenz H.: Design Theory. Vol. I, vol. 69, 2nd edn. Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (1999)."},{"issue":"6","key":"591_CR3","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor B., Kushilevitz E., Goldreich O., Sudan M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998).","journal-title":"J. ACM"},{"issue":"11","key":"591_CR4","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1016\/j.datak.2009.06.004","volume":"68","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer J., Bras-Amor\u00f3s M., Wu Q., Manj\u00f3n J.: User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11), 1237\u20131252 (2009).","journal-title":"Data Knowl. Eng."},{"issue":"4","key":"591_CR5","doi-asserted-by":"publisher","first-page":"39:1","DOI":"10.1145\/2968443","volume":"63","author":"Z Dvir","year":"2016","unstructured":"Dvir Z., Gopi S.: 2-Server PIR with subpolynomial communication. J. ACM 63(4), 39:1\u201339:15 (2016).","journal-title":"J. ACM"},{"key":"591_CR6","unstructured":"Higman D.G.: Invariant relations, coherent configurations and generalized polygons. In: Combinatorics, Part 3: Combinatorial Group Theory. Math. Centre Tracts, No. 57, pp. 27\u201343. Math. Centrum, Amsterdam (1974)."},{"key":"591_CR7","unstructured":"Payne S.E., Thas J.A.: Finite Generalized Quadrangles, vol. 110. Research Notes in Mathematics. Pitman, Boston (1984)."},{"issue":"4","key":"591_CR8","doi-asserted-by":"publisher","first-page":"1568","DOI":"10.1016\/j.camwa.2010.01.003","volume":"59","author":"K Stokes","year":"2010","unstructured":"Stokes K., Bras-Amor\u00f3s M.: Optimal configurations for peer-to-peer user-private information retrieval. Comput. Math. Appl. 59(4), 1568\u20131577 (2010).","journal-title":"Comput. Math. Appl."},{"issue":"4","key":"591_CR9","doi-asserted-by":"publisher","first-page":"479","DOI":"10.3934\/amc.2012.6.479","volume":"6","author":"CM Swanson","year":"2012","unstructured":"Swanson C.M., Stinson D.R.: Extended combinatorial constructions for peer-to-peer user-private information retrieval. Adv. Math. Commun. 6(4), 479\u2013497 (2012).","journal-title":"Adv. Math. Commun."},{"issue":"4","key":"591_CR10","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s12095-015-0125-x","volume":"7","author":"CM Swanson","year":"2015","unstructured":"Swanson C.M., Stinson D.R.: Extended results on privacy against coalitions of users in user-private information retrieval protocols. Cryptogr. Commun. 7(4), 415\u2013437 (2015).","journal-title":"Cryptogr. Commun."},{"issue":"3","key":"591_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3233\/JCS-1997-5305","volume":"5","author":"PF Syverson","year":"1997","unstructured":"Syverson P.F., Reed M.G., Goldschlag D.M.: Private web browsing. J. Comput. Secur. 5(3), 237\u2013248 (1997).","journal-title":"J. Comput. Secur."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-018-00591-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00591-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-018-00591-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T19:15:26Z","timestamp":1576869326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-018-00591-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,21]]},"references-count":11,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["591"],"URL":"https:\/\/doi.org\/10.1007\/s10623-018-00591-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2018,12,21]]},"assertion":[{"value":"22 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}