{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:36:22Z","timestamp":1775054182111,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011102","name":"Technical University of Munich\u2014Institute for Advanced Study by the German Excellence Initiative and European Union 7th Framework Program","doi-asserted-by":"publisher","award":["291763"],"award-info":[{"award-number":["291763"]}],"id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["WA3907\/1-1"],"award-info":[{"award-number":["WA3907\/1-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["19-71-00137"],"award-info":[{"award-number":["19-71-00137"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1817\/18"],"award-info":[{"award-number":["1817\/18"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016296","name":"Technion Hiroshi Fujiwara Cyber Security Research Center and the Israel National Cyber Directorate","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100016296","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tit.2021.3116520","type":"journal-article","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T21:55:36Z","timestamp":1632952536000},"page":"8051-8069","source":"Crossref","is-referenced-by-count":4,"title":["Lifted Reed-Solomon Codes and Lifted Multiplicity Codes"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8048-3051","authenticated-orcid":false,"given":"Lukas","family":"Holzbaur","sequence":"first","affiliation":[]},{"given":"Rina","family":"Polyanskaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3735-5705","authenticated-orcid":false,"given":"Nikita","family":"Polyanskii","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9270-7040","authenticated-orcid":false,"given":"Ilya","family":"Vorobyev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9851-5234","authenticated-orcid":false,"given":"Eitan","family":"Yaakobi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3051093"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20498"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2524007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3013603"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/978-3-319-70293-3_16","article-title":"Batch and PIR codes and their connections to locally repairable codes","author":"skachek","year":"2018","journal-title":"Network Coding and Subspace Designs"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/0205047"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20120"},{"key":"ref36","article-title":"Improved batch code lower bounds","author":"li","year":"2021","journal-title":"arXiv 2106 02163"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541488"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1254-8"},{"key":"ref10","article-title":"PIR with low storage overhead: Coding instead of replication","author":"fazeli","year":"2015","journal-title":"arXiv 1505 06241"},{"key":"ref11","first-page":"38:1","article-title":"Lifted multiplicity codes and the disjoint repair group property","volume":"145","author":"li","year":"2019","journal-title":"Proc Approximation Randomization Combinat Optim Algorithms Techn (APPROX\/RANDOM)"},{"key":"ref40","first-page":"347","article-title":"Some applications of coding theory in computational complexity","volume":"13","author":"trevisan","year":"2004","journal-title":"Quaderni di Matematica"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1954.1057465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00493-003-0025-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.856958"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793255151"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422494"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2011.14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2629416"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447047"},{"key":"ref28","author":"lin","year":"2004","journal-title":"Error Control Coding Fundamentals and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2208937"},{"key":"ref27","first-page":"43:1","article-title":"Locality via partially lifted codes","volume":"81","author":"frank-fischer","year":"2017","journal-title":"Proc Approximation Randomization Combinat Optim Algorithms Techn (APPROX\/RANDOM)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2435204.2435207"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/0400000030"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518246"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335315"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705446810"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4086\/toc.2020.v016a018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW46852.2021.9457625"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007396"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174402"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/REDUNDANCY48165.2019.9003339"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09519-5_73"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/100783704"},{"key":"ref24","article-title":"Lower bound on the redundancy of PIR codes","author":"rao","year":"2016","journal-title":"arXiv 1605 01869"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BF02759942"},{"key":"ref23","first-page":"2648","article-title":"Binary, shortened projective reed Muller codes for coded private information retrieval","author":"vajha","year":"2017","journal-title":"Proc IEEE Int Symp Inf Theory (ISIT)"},{"key":"ref41","first-page":"126","article-title":"Local testing and decoding of high-rate error-correcting codes","volume":"24","author":"kopparty","year":"2017","journal-title":"Proc Electron Colloq Comput Complex (ECCC)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(78)90067-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2852294"},{"key":"ref25","article-title":"Linear codes with disjoint repair groups","author":"wootters","year":"2016"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45624-4_4"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9622121\/09551886.pdf?arnumber=9551886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:22Z","timestamp":1652194462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9551886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":45,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2021.3116520","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}