{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:14:25Z","timestamp":1766067265209,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.ieee.org\/publications_standards\/publications\/rights\/ieeecopyrightform.pdf"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF 17-13977","ECCS 18-07348"],"award-info":[{"award-number":["CCF 17-13977","ECCS 18-07348"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/jsait.2021.3057597","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T09:02:31Z","timestamp":1612861351000},"page":"366-379","source":"Crossref","is-referenced-by-count":27,"title":["Multi-Party Private Set Intersection: An Information-Theoretic Approach"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8086-6036","authenticated-orcid":false,"given":"Zhusheng","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8547-5010","authenticated-orcid":false,"given":"Karim","family":"Banawan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8219-8190","authenticated-orcid":false,"given":"Sennur","family":"Ulukus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2888494"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2953883"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2936023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2977919"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2948845"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2906229"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CISS48834.2020.1570612786"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8635980"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2018.8635969"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613486"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2954336"},{"journal-title":"Semantic private information retrieval","year":"2020","author":"vithana","key":"ref62"},{"journal-title":"Private information retrieval over random linear networks","year":"2018","author":"tajeddine","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2883302"},{"key":"ref64","first-page":"554","article-title":"A minimal model for secure computation","author":"feige","year":"1994","journal-title":"Proc 26th Annu ACM Symp Theory Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335367"},{"journal-title":"Expand-and-randomize An algebraic approach to secure computation","year":"2020","author":"zhao","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.21236\/ADA457144"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2844940"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276723"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174274"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2900313"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2828310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2779454"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2869154"},{"journal-title":"Private information retrieval from MDS coded databases with colluding servers under several variant models","year":"2017","author":"zhang","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262857"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2890285"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2977058"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2878034"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2935440"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2933011"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2789426"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2977073"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2725225"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2916079"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833050"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2884891"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006860"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613532"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT.2018.8405043"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2848977"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2903206"},{"key":"ref14","first-page":"71","article-title":"Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers","author":"wang","year":"2017","journal-title":"Proc IEEE IEEE Inf Theory Workshop (ITW)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849351"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2981282"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2791994"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/16M1102562"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00640-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"journal-title":"Private set intersection A multimessage symmetric private information retrieval perspective","year":"2020","author":"wang","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2777490"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2689028"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849399"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006861"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/info10120372"},{"journal-title":"On the storage cost of private information retrieval","year":"2019","author":"tian","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2955053"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2964762"},{"journal-title":"Private information retrieval from storage constrained databases&#x2014;Coded caching meets PIR","year":"2017","author":"abdul-wahid","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437511"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ITW44776.2019.8989262"},{"journal-title":"The capacity of private information retrieval from uncoded storage constrained databases","year":"2018","author":"attia","key":"ref43"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8700143\/9380089\/9349622-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/9380089\/09349622.pdf?arnumber=9349622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T20:15:02Z","timestamp":1623701702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9349622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":69,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsait.2021.3057597","relation":{},"ISSN":["2641-8770"],"issn-type":[{"type":"electronic","value":"2641-8770"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}