{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:16:30Z","timestamp":1761293790450,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/isit.2018.8437349","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:14:55Z","timestamp":1534536895000},"page":"2112-2116","source":"Crossref","is-referenced-by-count":27,"title":["Private Computation of Systematically Encoded Data with Colluding Servers"],"prefix":"10.1109","author":[{"given":"David","family":"Karpuk","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"The capacity of private information retrieval from byzantine and colluding databases","year":"2017","author":"banawan","key":"ref10"},{"journal-title":"The capacity of private computation","year":"2017","author":"sun","key":"ref11"},{"journal-title":"The Theory of Error-Correcting Codes","year":"1977","author":"macwilliams","key":"ref12"},{"journal-title":"Private function retrieval","year":"2017","author":"mirmohseni","key":"ref13"},{"journal-title":"The capacity of private information retrieval from coded databases","year":"2016","author":"banawan","key":"ref4"},{"journal-title":"IEEE Transactions on Information Theory","article-title":"The capacity of robust private information retrieval with colluding databases","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006861"},{"key":"ref5","first-page":"647","article-title":"Private information retrieval from coded databases with colluding servers","volume":"1","author":"freij-hollanti","year":"2017","journal-title":"Journal of Pure and Applied Algebra"},{"journal-title":"Achieving private information retrieval capacity in distributed storage using an arbitrary linear code","year":"2017","author":"kumar","key":"ref8"},{"journal-title":"Private information retrieval from MDS coded databases with colluding servers under several variant models","year":"2017","author":"zhang","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2689028"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"journal-title":"t-private information retrieval schemes using transitive codes","year":"2017","author":"freij-hollanti","key":"ref9"}],"event":{"name":"2018 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2018,6,17]]},"location":"Vail, CO","end":{"date-parts":[[2018,6,22]]}},"container-title":["2018 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410646\/8437120\/08437349.pdf?arnumber=8437349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:52:11Z","timestamp":1598241131000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8437349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2018.8437349","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}