{"id":"https://openalex.org/W4386066105","doi":"https://doi.org/10.1109/isit54713.2023.10206863","title":"The Capacity of Oblivious Transfer with Replicated Databases and Binary Erasure Multiple Access Channel","display_name":"The Capacity of Oblivious Transfer with Replicated Databases and Binary Erasure Multiple Access Channel","publication_year":2023,"publication_date":"2023-06-25","ids":{"openalex":"https://openalex.org/W4386066105","doi":"https://doi.org/10.1109/isit54713.2023.10206863"},"language":"en","primary_location":{"id":"doi:10.1109/isit54713.2023.10206863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005307305","display_name":"Tianyou Pei","orcid":"https://orcid.org/0000-0002-5271-2750"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianyou Pei","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China","School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024845943","display_name":"Wei Kang","orcid":"https://orcid.org/0000-0003-4408-6419"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Kang","raw_affiliation_strings":["Southeast University,School of Information Science and Engineering,Nanjing,China","School of Information Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Information Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100622088","display_name":"Nan Liu","orcid":"https://orcid.org/0000-0003-4155-0685"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Liu","raw_affiliation_strings":["Southeast University,National Mobile Communications Research Laboratory,Nanjing,China","National Mobile Communications Research Laboratory, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Southeast University,National Mobile Communications Research Laboratory,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"National Mobile Communications Research Laboratory, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005307305"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.6507871,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1592","last_page":"1596"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811156511306763},{"id":"https://openalex.org/keywords/converse","display_name":"Converse","score":0.7773808836936951},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.6803920865058899},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.6647092700004578},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.5899872183799744},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5752580761909485},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.5716540217399597},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.5210551619529724},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5148626565933228},{"id":"https://openalex.org/keywords/binary-symmetric-channel","display_name":"Binary symmetric channel","score":0.4935225248336792},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.47632986307144165},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.4761076867580414},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.44668257236480713},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.445451557636261},{"id":"https://openalex.org/keywords/distributed-database","display_name":"Distributed database","score":0.43616747856140137},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3379390835762024},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28892752528190613},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.23886147141456604},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23135903477668762},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17306563258171082},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15073969960212708},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13017642498016357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811156511306763},{"id":"https://openalex.org/C2776809875","wikidata":"https://www.wikidata.org/wiki/Q1375963","display_name":"Converse","level":2,"score":0.7773808836936951},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.6803920865058899},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6647092700004578},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.5899872183799744},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5752580761909485},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.5716540217399597},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.5210551619529724},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5148626565933228},{"id":"https://openalex.org/C173988684","wikidata":"https://www.wikidata.org/wiki/Q863510","display_name":"Binary symmetric channel","level":4,"score":0.4935225248336792},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.47632986307144165},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.4761076867580414},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.44668257236480713},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.445451557636261},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.43616747856140137},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3379390835762024},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28892752528190613},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.23886147141456604},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23135903477668762},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17306563258171082},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15073969960212708},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13017642498016357},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit54713.2023.10206863","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit54713.2023.10206863","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324856","display_name":"Southeast University","ror":"https://ror.org/04ct4d772"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1964580496","https://openalex.org/W1964990628","https://openalex.org/W2014996477","https://openalex.org/W2020316223","https://openalex.org/W2061362744","https://openalex.org/W2101776874","https://openalex.org/W2104883478","https://openalex.org/W2111339861","https://openalex.org/W2162935207","https://openalex.org/W2169419262","https://openalex.org/W2176183625","https://openalex.org/W2599749253","https://openalex.org/W2808769206","https://openalex.org/W3174294179","https://openalex.org/W4312229871","https://openalex.org/W6797953373"],"related_works":["https://openalex.org/W2139769859","https://openalex.org/W2140357074","https://openalex.org/W2502955786","https://openalex.org/W2113562070","https://openalex.org/W2162141500","https://openalex.org/W2583282232","https://openalex.org/W2028268383","https://openalex.org/W2372190485","https://openalex.org/W3103136794","https://openalex.org/W2963601677"],"abstract_inverted_index":{"Both":[0],"the":[1,7,15,28,31,36,39,45,51,61,64,70,83,107,110,119,129,135,150,173],"oblivious":[2,92],"transfer":[3,93],"(OT)":[4,94],"problem":[5,13,49,68,90],"and":[6,23,38,63,75,86,99,109,145,156],"symmetric":[8],"private":[9],"information":[10,21,41],"retrieval":[11],"(SPIR)":[12],"studies":[14,50,69],"scenario":[16],"where":[17],"a":[18,88,100,125,169],"client":[19,32],"retrieves":[20],"privately":[22],"securely":[24],"from":[25,35,44,152,165],"databases,":[26,37],"i.e.,":[27],"privacy":[29],"of":[30,53,72,91,137],"is":[33,42],"protected":[34,43],"undesired":[40],"client.":[46,65,111],"The":[47,66],"OT":[48,120,138,155,175],"case":[52,71],"one":[54],"database":[55,62],"plus":[56],"additional":[57],"noisy":[58],"resources":[59],"between":[60],"SPIR":[67],"multiple":[73,103],"replicated":[74,97],"non-colluding":[76],"databases.":[77],"In":[78,142],"this":[79,140],"paper,":[80],"we":[81,133,148,167],"combine":[82],"two":[84,96],"models":[85],"propose":[87,124],"new":[89],"with":[95],"databases":[98,108],"binary":[101],"erasure":[102],"access":[104],"channel":[105],"connecting":[106],"We":[112,122],"first":[113],"provide":[114],"an":[115],"upper":[116,130],"bound":[117],"on":[118],"capacity.":[121],"then":[123],"protocol":[126],"which":[127],"achieves":[128],"bound.":[131],"Therefore,":[132],"obtain":[134],"capacity":[136],"for":[139],"model.":[141],"our":[143],"achievability":[144],"converse":[146],"proofs,":[147],"utilized":[149],"techniques":[151,164],"both":[153],"traditional":[154],"PIR.":[157],"Compared":[158],"to":[159],"schemes":[160],"that":[161],"utilizes":[162],"only":[163],"OT,":[166],"see":[168],"100%":[170],"increase":[171],"in":[172],"achieved":[174],"rate.":[176]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
