{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:16:14Z","timestamp":1761293774749},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/iwcit.2018.8405043","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T23:00:21Z","timestamp":1531177221000},"source":"Crossref","is-referenced-by-count":47,"title":["Private function retrieval"],"prefix":"10.1109","author":[{"given":"Mahtab","family":"Mirmohseni","sequence":"first","affiliation":[]},{"given":"Mohammad Ali","family":"Maddah-Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The capacity of private information retrieval from coded databases","author":"banawan","year":"2016","journal-title":"arXiv preprint arXiv 1609 08138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2016.7849060"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997029"},{"key":"ref13","article-title":"The capacity of private computation","author":"sun","year":"2017","journal-title":"arXiv preprint arXiv 1710 11098"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6874954"},{"key":"ref3","first-page":"41","article-title":"Private information retrieval","author":"chor","year":"1995","journal-title":"Foundations of Computer Science 1995 Proceedings 36th Annual Symposium on"},{"key":"ref6","article-title":"A fundamental tradeoff between computation and communication in distributed computing","author":"li","year":"2017","journal-title":"IEEE Transactions on Information Theory"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2689028"},{"key":"ref8","article-title":"The capacity of robust private information retrieval with colluding databases","author":"sun","year":"2016","journal-title":"arXiv preprint arXiv 1605 01584"},{"key":"ref7","article-title":"Polynomial codes: an optimal design for high-dimensional coded matrix multiplication","author":"yu","year":"2017","journal-title":"arXiv preprint arXiv 1705 10464"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2306938"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref9","article-title":"The capacity of private information retrieval from byzantine and colluding databases","author":"banawan","year":"2017","journal-title":"arXiv preprint arXiv 1706 01442"}],"event":{"name":"2018 Iran Workshop on Communication and Information Theory (IWCIT)","location":"Tehran","start":{"date-parts":[[2018,4,25]]},"end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Iran Workshop on Communication and Information Theory (IWCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8399724\/8405030\/08405043.pdf?arnumber=8405043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:51:33Z","timestamp":1533023493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8405043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iwcit.2018.8405043","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}