• Aucun résultat trouvé

Codes with locality : constructions and applications to cryptographic protocols

N/A
N/A
Protected

Academic year: 2021

Partager "Codes with locality : constructions and applications to cryptographic protocols"

Copied!
189
0
0

Texte intégral

Loading

Figure

Tableau orthogonal
Figure 2 – Outline of the construction of a distributed PIR protocol using incidence codes.
Figure 1.1 – Fano plane.
Figure 2.1 – High-rate lifted and multiplicity codes correcting a constant fraction δ of errors, with relative locality at most λ
+7

Références

Documents relatifs

The extension of Construction 13 to codes with higher distance and optimal dimension, the usage of other first-order cyclic Reed–Muller codes as locality code similar to

of Mississippi is very similar to Iodes in having a vascular bundle inside the endocarp wall 397. and a reticulate pattern of endocarp ridges (Stull et

study hardware attacks (and in the context of the COST action, especially fault injection attacks) on cryptographic protocols based on error-correcting codes,.. modify

This includes placement algorithms walking the tree in recursive top-down manner as well as simple queries such as finding the local memory nodes, the local cores, or specifics such

Our work significantly differs from those previous ones, by being the first one to extensively evaluate the impact of key parameters like the number of inter-ISP connections,

El Rouayheb, “Private information retrieval from mds coded data in distributed storage systems,” IEEE Transactions on Information Theory, vol. Karpuk, “Private information

In general, EUV irradiance should be the main variable factor for the three primary quantities for determining photochemical escape: (a) photoionization rates, which determine

MDS codes with the Simplex code was considered (note that a 51 distance-3 MDS code, even non-linear, is always completely 52 regular [12, Cor. 6]); the result is a two-weight