{"id":"https://openalex.org/W4289655348","doi":"https://doi.org/10.1109/isit50566.2022.9834634","title":"Private Information Delivery with Coded Storage","display_name":"Private Information Delivery with Coded Storage","publication_year":2022,"publication_date":"2022-06-26","ids":{"openalex":"https://openalex.org/W4289655348","doi":"https://doi.org/10.1109/isit50566.2022.9834634"},"language":"en","primary_location":{"id":"doi:10.1109/isit50566.2022.9834634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834634","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006547993","display_name":"Kanishak Vaidya","orcid":"https://orcid.org/0009-0003-1512-8891"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kanishak Vaidya","raw_affiliation_strings":["IISc Bangalore,Department of Electrical Communication Engineering,India","Department of Electrical Communication Engineering, IISc Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc Bangalore,Department of Electrical Communication Engineering,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Communication Engineering, IISc Bangalore, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004805416","display_name":"B Sundar Rajan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B Sundar Rajan","raw_affiliation_strings":["IISc Bangalore,Department of Electrical Communication Engineering,India","Department of Electrical Communication Engineering, IISc Bangalore, India"],"affiliations":[{"raw_affiliation_string":"IISc Bangalore,Department of Electrical Communication Engineering,India","institution_ids":[]},{"raw_affiliation_string":"Department of Electrical Communication Engineering, IISc Bangalore, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006547993"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.2079,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.40072183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"2011","last_page":"2015"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.9109854698181152},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6659994721412659},{"id":"https://openalex.org/keywords/pid-controller","display_name":"PID controller","score":0.5442479252815247},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5099779367446899},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.47681304812431335},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.428123414516449},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21696025133132935},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1399250626564026},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08051803708076477}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.9109854698181152},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6659994721412659},{"id":"https://openalex.org/C47116090","wikidata":"https://www.wikidata.org/wiki/Q716829","display_name":"PID controller","level":3,"score":0.5442479252815247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5099779367446899},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.47681304812431335},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.428123414516449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21696025133132935},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1399250626564026},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08051803708076477},{"id":"https://openalex.org/C536315585","wikidata":"https://www.wikidata.org/wiki/Q7698332","display_name":"Temperature control","level":2,"score":0.0},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit50566.2022.9834634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit50566.2022.9834634","pdf_url":null,"source":{"id":"https://openalex.org/S4363604560","display_name":"2022 IEEE International Symposium on Information Theory (ISIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334771","display_name":"Science and Engineering Research Board","ror":"https://ror.org/03ffdsr55"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W3005546314","https://openalex.org/W3048524235","https://openalex.org/W4289655348"],"related_works":["https://openalex.org/W2002388147","https://openalex.org/W3098928304","https://openalex.org/W2394883510","https://openalex.org/W2150958483","https://openalex.org/W2922503265","https://openalex.org/W2023324176","https://openalex.org/W2121097709","https://openalex.org/W3097920840","https://openalex.org/W2165013373","https://openalex.org/W3212795132"],"abstract_inverted_index":{"In":[0,122,162],"private":[1],"information":[2],"delivery":[3],"(PID)":[4],"problem,":[5],"there":[6],"are":[7,169],"K":[8,30],"messages":[9,19,31,83],"stored":[10],"across":[11],"N":[12,119,150,155],"servers,":[13],"each":[14],"capable":[15],"of":[16,28,40,46,55,57,68,78,96,117,129,140],"storing":[17],"M":[18],"and":[20,120,153],"a":[21,138],"user.":[22,73],"Servers":[23],"want":[24],"to":[25,32,71],"convey":[26],"one":[27,86],"the":[29,33,37,41,52,58,72,75,94,127,135,147,164,166,172,176],"user":[34],"without":[35],"revealing":[36],"identity":[38],"(index)":[39],"message":[42,60,87],"conveyed.":[43],"The":[44],"capacity":[45,95,148],"PID":[47,97,130,144],"problem":[48,128],"is":[49,91],"defined":[50],"as":[51],"maximum":[53],"number":[54],"bits":[56],"desired":[59],"that":[61],"can":[62],"be":[63],"conveyed":[64],"privately,":[65],"per":[66],"bit":[67],"total":[69],"communication,":[70],"For":[74,137],"restricted":[76],"case":[77],"replicated":[79,177],"systems,":[80],"where":[81],"coded":[82,132],"or":[84],"splitting":[85],"into":[88],"several":[89],"servers":[90],"not":[92],"allowed,":[93],"has":[98],"been":[99],"characterized":[100],"by":[101],"Hua":[102],"Sun":[103],"in":[104,115],"\"Private":[105],"Information":[106,111],"Delivery,":[107],"IEEE":[108],"Transactions":[109],"on":[110],"Theory,":[112],"December":[113],"2020\"":[114],"terms":[116],"K,":[118],"M.":[121],"this":[123],"paper,":[124],"we":[125,145,158],"study":[126],"with":[131,175],"storage":[133],"at":[134],"servers.":[136],"class":[139],"problems":[141],"called":[142],"bi-regular":[143],"characterize":[146],"for":[149,154],"=":[151],"K/M":[152,157],">":[156],"provide":[159],"achievable":[160,174],"scheme.":[161],"both":[163],"cases,":[165],"rates":[167,173],"achieved":[168],"more":[170],"than":[171],"systems.":[178]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
