- 1.
Chor, B.; Kushilevitz, E.; Goldreich, O.; et al. Private information retrieval. In Proceedings of the FOCS 1995, Milwaukee, WI, USA, 23–25 October 1995; pp. 41–50.
- 2.
Kushilevitz, E.; Ostrovsky, R. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, FL, USA, 20–22 October 1997; pp. 364–373.
- 3.
Wang, F.; Yun, C.; Goldwasser, S.; et al. Splinter: Practical private queries on public data. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), Boston, MA, USA, 27–29 March 2017; pp. 299–313.
- 4.
Angel, S.; Setty, S. Unobservable communication over fully untrusted infrastructure.In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), Savannah, GA, USA, 2–4 November 2016; pp. 551–569.
- 5.
Angel, S.; Chen, H.; Laine, K.; et al. PIR with compressed queries and amortized query processing. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–23 May 2018; pp. 962–979.
- 6.
Gupta, T.; Crooks, N.; Mulhern, W.; et al. Scalable and private media consumption with Popcorn. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA, 16–18 March 2016; pp. 91–107.
- 7.
Kales, D.; Rechberger, C.; Schneider, T.; et al. Mobile private contact discovery at scale. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 1447–1464.
- 8.
Kogan, D.; Corrigan-Gibbs, H. Private blocklist lookups with Checklist. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada, 11–13 August 2021; pp. 875–892.
- 9.
Backes, M.; Kate, A.; Maffei, M.; et al. ObliviAd: Provably secure and practical online behavioral advertising. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, San Francisco, CA USA, 20–23 May 2012; pp. 257–271.
- 10.
Servan-Schreiber, S.; Hogan, K.; Devadas, S. AdVeil: A private targeted–advertising ecosystem. IACR Cryptol. Eprint Arch. 2021, 2021, 1032.
- 11.
Henzinger, A.; Hong, M.M.; Corrigan-Gibbs, H.; et al. One server for the price of two: Simple and fast single-server private information retrieval. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 3889–3905.
- 12.
Henzinger, A.; Dauterman, E.; Corrigan-Gibbs, H.; et al. Private web search with Tiptoe. In Proceedings of the 29th Symposium on Operating Systems Principles, Koblenz, Germany, 23–26 October 2023; pp. 396–416.
- 13.
Henry, R.; Olumofin, F.; Goldberg, I. Practical PIR for electronic commerce. In Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA, October 17–21 2011; pp. 677–690.
- 14.
Ghinita, G.; Kalnis, P.; Khoshgozaran, A.; Shahabi, C.; et al. Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, 10–12 June 2008; pp. 121–132.
- 15.
Chen, H.; Huang, Z.; Laine, K.; et al. Labeled PSI from fully homomorphic encryption with malicious security. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 1223–1237.
- 16.
Google. Available online: https://services.google.com/fh/files/misc/zero touch enrollment for chrome os devices one pager.pdf (accessed on 11 August 2025).
- 17.
Menon, S.J.; Wu, D.J. SPIRAL: Fast, high-rate single-server PIR via FHE composition. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 23–26 May 2022; pp. 930–947.
- 18.
Davidson, A.; Pestana, G.; Celi, S. FrodoPIR: Simple, scalable, singleserver private information retrieval. Proc. Priv. Enhancing Technol. 2023, 2023, 365–383.
- 19.
Katz, J.; Trevisan, L. On the efficiency of local decoding procedures for error-correcting codes. In Proceedings of the Thirty-Second Annual ACM Aymposium on Theory of Computing Portland, OR, USA, 21–23 May 2000; pp. 80–86.
- 20.
Yekhanin, S. Locally decodable codes. Found. Trends Theor. Comput. Sci. 2012, 6, 139–255.
- 21.
Zhang, L.F. A coding-theoretic application of Baranyai’s theorem. IEEE Trans. Inf. Theory 2014, 60, 6988–6992.
- 22.
Shai, Y.; Kushilevitz, E. On the hardness of information-theoretic multiparty computation. In Proceedings of the EURO-CRYPT, Interlaken, Switzerland, 2–6 May 2004; pp. 439–455.
- 23.
Beimel, A.; Chee, Y.M.; Wang, H.; et al. Communication-efficient distributed oblivious transfer. J. Comput. Syst. Sci. 2012, 78, 1142–1157.
- 24.
Beimel, A.; Ishai, Y.; Kushilevitz, E.; et al. One-way functions are essential for single-server private information retrieval. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, Atlanta, GA, USA, 1–4 May 1999; pp. 89–98.
- 25.
Di Crescenzo, G.; Malkin, T.; Ostrovsky, R. Single database private information retrieval implies oblivious transfer. In Proceedings of the EUROCRYPT 2000, Bruges, Belgium, 14–18 May 2000; pp.122–138.
- 26.
Naor, M.; Pinkas, B. Oblivious transfer and polynomial evaluation. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, Dallas, TX, USA, 23–26 May 1999; pp. 245–254.
- 27.
Ishai, Y.; Kushilevitz, E.; Ostrovsky, R. Sufficient conditions for collision-resistant hashing. In Proceedings of the TCC, Cambridge, MA, USA, 10–12 February 2005; pp. 445–456.
- 28.
Kalai, Y.T.; Raz, R. Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP. In Proceedings of the 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), Berkeley, CA, USA, 21–24 October 2006; pp. 355–366.
- 29.
Ambainis, A. Upper bound on communication complexity of private information retrieval. In Proceedings of the Interna- tional Colloquium on Automata, Languages, and Programming (ICALP), Bologna, Italy, 7–11 July 1997; pp. 401–407.
- 30.
Itoh, T. Efficient private information retrieval. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E82-A(1) 1999, 82, 11–20.
- 31.
Ishai, Y.; Kushilevitz, E. Improved Upper Bounds on Information-Theoretic Private Information Retrieval. In Proceedings of the thirty-first annual ACM symposium on Theory of computing (STOC), Atlanta, GA, USA, 1–4 May 1999; pp. 79–88.
- 32.
Beimel, A.; Ishai, Y. Information-theoretic private information retrieval: A unified construction. In Proceedings of the ICALP, Crete, Greece, 8–12 July 2001; pp. 912–926.
- 33.
Woodruff, D.; Yekhanin, S. A geometric approach to information-theoretic private information retrieval. In Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC), San Jose, CA, USA, 11–15 June 2005; pp. 275–284.
- 34.
Yekhanin, S. Towards 3-query locally decodable codes of subexponential length. In Proceedings of the STOC, San Diego, CA, USA, 11–13 June 2007; pp. 266–274.
- 35.
Raghavendra, P. A note on Yekhanin’s locally decodable codes. In Proceedings of the Electronic Colloquium on Computational Complexity TR07, Weizmann Institute of Science, Rehovot, Israel, 15 January 2007.
- 36.
Kedlaya, K.S.; Yekhanin, S. Locally decodable codes from nice subsets of finite fields and prime factors of Mersenne numbers. In Proceedings of the CCC, College Park, MD, USA, 23–26 June 2008; pp. 175–186.
- 37.
Efremenko, K. 3-query locally decodable codes of subexponential length. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC), Bethesda, MD, USA, 31 May–2 June 2009; pp. 39–44.
- 38.
Itoh, T.; Suzuki, Y. Improved constructions for query-efficient locally decodable codes of subexponential length. IEICE Trans. Inf. Syst. 2010, 93, 263–270.
- 39.
Chee, Y.M.; Feng, T.; Ling, S.; et al. Query-efficient locally decodable codes of subexponential length. Comput. Complex. 2013, 22, 159–189.
- 40.
Dvir, Z.; Gopi, S. 2-Server PIR with sub-polynomial communication. In Proceedings of the STOC, Portland, OR, USA, 14–17 June 2015; pp.577–584.
- 41.
Alon, B.; Beimel, A.; Lasri, O. Simplified PIR and CDS Protocols and improved linear secret-sharing protocols. IACR Cryptol. Eprint Arch. 2024, 2024, 1599.
- 42.
Ghasemi, F.; Kopparty, S.; Sudan, M. Improved PIR protocols using matching vectors and derivatives. In Proceedings of the STOC, Prague, Czech Republic, 23–27 June 2025; pp. 1648–1656.
- 43.
Cachin, C.; Micali, S.; Stadler, M. Computationally private information retrieval with polylogarithmic communication. In Proceedings of the EUROCRYPT, Prague, Czech Republic, 2–6 May 1999; pp. 402–414.
- 44.
Chang, Y.-C. Single database private information retrieval with logarithmic communication. In Proceedings of the ACISP, Sydney, Australia, 13–15 July 2004; pp. 50–61.
- 45.
Lipmaa, H. An oblivious transfer protocol with log-squared communication. In Proceedings of the ISC, Singapore, 20–23 September 2005; pp.314–328.
- 46.
Gentry, C.; Ramzan, Z. Single-database private information retrieval with constant communication rate. In Proceedings of the ICALP 2005, Lisbon, Portugal, 11–15 July 2005; pp. 803–815.
- 47.
Melchor, C.A.; Gaborit, P. A lattice-based computationally-efficient private information retrieval protocol. IACR Cryptol. Eprint Arch. 2007, 2007, 446.
- 48.
Lipmaa, H. First CPIR protocol with data-dependent computation. In Proceedings of the ICISC 2009, Seoul, Korea, 2–4 December 2009; pp. 193–210.
- 49.
Groth, J.; Kiayias, A.; Lipmaa, H. Multi-query computationally-private information retrieval with constant communication rate. In Proceedings of the Public Key Cryptography 2010, Paris, France, 26–28 May 2010; pp. 107–123.
- 50.
Yi X.; Kaosar, M.G.; Paulet, R.; et al. Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 2013, 25, 1125–1134.
- 51.
Dong, C.; Chen, L. A fast single server private information retrieval protocol with low communication cost. In Proceedings of the ESORICS (1) 2014, Wroclaw, Poland, 7–11 September 2014; pp. 380–399
- 52.
Kiayias, A.; Leonardos, N.; Lipmaa, H.; et al. Optimal rate private information retrieval from homomorphic encryption. In Proceedings of the Privacy Enhancing Technologies, Philadelphia, PA, USA, 30 June–2 July 2015; pp. 222–243.
- 53.
Lipmaa, H.; Pavlyk, K. A simpler rate-optimal CPIR protocol. In Proceedings of the Financial Cryptography 2017, Sliema, Malta, 3–7 April 2017; pp. 621–638
- 54.
Beimel, A.; Ishai, Y.; Malkin, T. Reducing the servers computation in private information retrieval: PIR with preprocessing. In Proceedings of the CRYPTO 2000, Santa Barbara, CA, USA, 20–24 August 2000; pp. 55–73.
- 55.
Sion, R.; Carbunar, B. On the practicality of private information retrieval. In Proceedings of the NDSS 2007, San Diego, CA, USA, 26 February–4 March 2007.
- 56.
Singh, J.; Wei, Y.; Zikas, V. Information-theoretic multi-server private information retrieval with client preprocessing. In Proceedings of the TCC (4) 2024, Milan, Italy, 2–6 December 2024; pp. 423–450.
- 57.
Ishai, Y.; Shi, E.; Wichs, D. PIR with client-side preprocessing: Information-theoretic constructions and lower bounds. In Proceedings of the CRYPTO (9) 2024, Santa Barbara, CA, USA, 18–22 August 2024; pp. 148–182.
- 58.
Boyle, E.; Ishai, Y.; Pass, R.; et al. Can we access a database both locally and privately? In Proceedings of the TCC (2) 2017, Baltimore, MD, USA, 12–15 November 2017; pp. 662–693.
- 59.
Canetti, R.; Holmgren, J.; Richelson, S. Towards doubly efficient private information retrieval. In Proceedings of the TCC (2) 2017, Baltimore, MD, USA, 12–15 November 2017; pp. 694–726.
- 60.
Corrigan-Gibbs, H.; Kogan, D. Private information retrieval with sublinear online time. In Proceedings of the EUROCRYPT (1) 2020, Zagreb, Croatia, 10–14 May 2020; pp. 44–75.
- 61.
Ghoshal, A.; Zhou, M.; Shi, E. Efficient pre-processing PIR without public-key cryptography. In Proceedings of the EUROCRYPT (6) 2024, Zurich, Switzerland, 26–30 May 2024; pp. 210–240.
- 62.
Wei–Kai Lin, W.-K.; Mook, E.; Wichs, D. Doubly efficient private information retrieval and fully homomorphic ram computation from ring LWE. In Proceedings of the STOC 2023, Orlando, FL, USA, 20–23 June 2023; pp. 595–608.
- 63.
Ren, L.; Mughees, M.H.; Sun, I. Simple and practical amortized sublinear private information retrieval using dummy subsets. In Proceedings of the CCS 2024, V Vancouver, BC, USA, 24–27 October 2024; pp. 1420–1433.
- 64.
Patel, S.; Persiano, G.; Yeo, K. Private stateful information retrieval. In Proceedings of the CCS 2018, Toronto, ON, Canada, 15–19 October 2018; pp. 1002–1019.
- 65.
Shi, E.; Aqeel, W.; Rasekaran, B.; et al. Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time. In Proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, 16–20 August 2021; pp. 641–669.
- 66.
Zhou, M.; Park, A.; Zheng, W.; et al. Piano: Extremely simple, single-server PIR with sublinear server computation. In Proceedings of the IEEE Symposium on Security and Privacy 2024, San Francisco, CA, USA, 19–23 May 2024; pp. 4296–4314.
- 67.
Ali, A.; Lepoint, T.; Patel, S.; et al. Communication-computation trade-offs in PIR. In Proceedings of the USENIX Security Symposium 2021, Vancouver, BC, Canada, 11–13 August 2021; pp. 1811–1828.
- 68.
Mughees, M.H.; Chen, H.; Ren, L. OnionPIR: Response efficient single-server PIR. In Proceedings of the CCS 2021, New York, NY, USA, 15–19 November 2021; pp. 2292–2306.
- 69.
Mahdavi, R.A.; Kerschbaum, F. Constant-weight PIR: Single-round keyword PIR via constant-weight equality operators. In Proceedings of the USENIX Security Symposium 2022, Boston, MA, USA, 10–12 August 2022; pp. 1723–1740.
- 70.
Corrigan-Gibbs, H.; Henzinger, A.; Kogan, D. Single-server private information retrieval with sublinear amortized time. In Proceedings of the EUROCRYPT (2) 2022, Trondheim, Norway, 30 May–3 June 2022; pp. 3–33.
- 71.
Zhou, M.; Lin, W.-K.; Tselekounis, Y.; et al. Optimal single-server private information retrieval. In Proceedings of the EUROCRYPT (1) 2023, Lyon, France, 23–27 April 2023; pp. 395–425.
- 72.
Lazzaretti, A.; Papamanthou, C. TreePIR: Sublinear-time and polylog-bandwidth private information retrieval from DDH. In Proceedings of the CRYPTO (2) 2023, Santa Barbara, CA, USA, 19–24 August 2023; pp. 284–314.
- 73.
Luo, M.; Liu, F.-H.; Wang, H. Faster FHE-based single-server private information retrieval. In Proceedings of the CCS 2024, Vancouver, BC, Canada, 24–27 October 2024; pp. 1405–1419.
- 74.
Li, B.; Micciancio, D.; Raykova, M.; et al. Hintless single-server private information retrieval. In Proceedings of 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2024; pp. 183–217.
- 75.
Lazzaretti, A.; Papamanthou, C. Single pass client-preprocessing private information retrieval. In Proceedings of the USENIX Security Symposium 2024, Philadelphia, PA, USA, 14–16 August 2024; pp. 5967–5984.
- 76.
Fisch, B.; Lazzaretti, A.; Liu, Z.; et al. ThorPIR: Single server PIR via homomorphic thorp shuffles. In Proceedings of the CCS 2024, Vancouver, BC, Canada, 24–27 October 2024; pp. 1448–1462.
- 77.
Menon, S.J.; Wu, D.J. YPIR: High-throughput single-server PIR with silent preprocessing. In Proceedings of the USENIX Security Symposium 2024, Philadelphia, PA, USA, 14–16 August 2024; pp. 5985–6002.
- 78.
Hoover, A.; Patel, S.; Persiano, G.; et al. Plinko: Single-server PIR with efficient updates via invertible PRFs. In Proceedings of the EUROCRYPT (6) 2025, Madrid, Spain, 3–4 May 2025; pp. 3–33.
- 79.
Wang, Z.; Ren, L. Single-server client preprocessing PIR with tight space-time trade-off. In Proceedings of the EURO-CRYPT (6) 2025, Madrid, Spain, 3–4 May 2025; pp. 94–122.
- 80.
Amos Beimel, A.; Yoav Stahl, Y. Robust information-theoretic private information retrieval. In Proceedings of the SCN 2002, Amalfi, Italy, 11–13 September 2002; pp. 326–341.
- 81.
Goldberg, I. Improving the robustness of private information retrieval. In Proceedings of the IEEE Symposium on Security and Privacy 2007, Oakland, CA, USA, 20–23 May 2007; pp. 131–148.
- 82.
Devet, C.; Goldberg,I.; Heninger, N. Optimally robust private information retrieval. In Proceedings of the USENIX Security Symposium 2012, Bellevue, WA, USA, 8–10 August 2012; pp. 269–283.
- 83.
Kurosawa, K. How to correct errors in multi-server PIR. In Proceedings of the ASIACRYPT (2) 2019, Kobe, Japan, 8–12 December 2019; pp. 564–574.
- 84.
Zhang, L.F.; Wang, H.; Wang, L.-P. Byzantine-robust private information retrieval with low communication and efficient decoding. In Proceedings of the AsiaCCS 2022, Nagasaki, Japan, 30 May–3 June 2022; pp. 1079–1085.
- 85.
Eriguchi, R.; Kurosawa, K.; Nuida, K. On the optimal communication complexity of error-correcting multi-server PIR. In Proceedings of the TCC (3) 2022, Chicago, IL, USA, 7–10 November 2022, 60–88.
- 86.
Eriguchi, R.; Kurosawa, K.; Nuida, K. Efficient and generic methods to achieve active security in private information retrieval and more advanced database search. In Proceedings of the EUROCRYPT (5) 2024, Zurich, Switzerland, 26–30 May 2024; pp. 92–121.
- 87.
Zhang, L.F; Safavi-Naini, R. Verifiable multi-server private information retrieval. In Proceedings of the ACNS 2014, Lausanne, Switzerland, 10–13 June 2014; pp. 62–79.
- 88.
Zhu, L.; Lin, C.; Lin, F.; et al. Postquantum cheating detectable private information retrieval. In Proceedings of the SEC 2022, Boston, MA, USA, 10–12 August 2022; pp. 431–448.
- 89.
Cao, Q.; Tran, H.Y.; Dau, S.H.; et al. Committed private information retrieval. In Proceedings of the ESORICS (1) 2023, The Hague, The Netherlands, 25–29 September 2023; pp. 393–413.
- 90.
Zhang, L.F.; Wang, H. Multi-server verifiable computation of low-degree polynomials. In Proceedings of the IEEE Symposium on Security and Privacy 2022, San Francisco, CA, USA, 23–25 May 2022; pp. 596–613.
- 91.
Ke, P.; Zhang, L.F. Two-server private information retrieval with result verification. In Proceedings of the ISIT 2022, Espoo, Finland, 26 June–1 July 2022; pp. 408–413.
- 92.
Ke, P.; Zhang, L.F. Private information retrieval with result verification for more servers. In Proceedings of the ACNS 2023, Kyoto, Japan, 19–22 June 2023; pp. 197–216.
- 93.
Kruglik, S.; Dau, S.H.; Kiah, H.M.; et al. Querying twice to achieve information-theoretic verifiability in private information retrieval. IEEE Trans. Inf. Forensics Secur. 2024, 19, 8172–8187.
- 94.
Eriguchi, R.; Kurosawa, K.; Nuida, K. Multi-server PIR with full error detection and limited error correction. In Proceedings of the ITC 2022, Cambridge, MA, USA, 23–30 September 2022.
- 95.
Colombo, S.; Nikitin, K.; Corrigan-Gibbs, H.; et al. Authenticated private information retrieval. In Proceedings of the USENIX Security Symposium 2023, Anaheim, CA, USA, 9–11 August 2023; pp. 3835–3851.
- 96.
Dietz, M.; Tessaro, S. Fully malicious authenticated PIR. In Proceedings of the 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2024; pp. 113–147
- 97.
Gasarch, W.I. A survey on private information retrieval. Bull. EATCS 2004, 82, 72–107.
- 98.
Beimel, A. Private Information Retrieval: A primer. Available online: www.cs.bgu.ac.il /beimel/ Papers/PIRsurvey.ps (accessed on 11 August 2025).
- 99.
Blundo, C. Private Information Retrieval, Encyclopedia of Cryptography and Security; Springer Nature: Cham, Switzerland, 2011; pp. 974–976.
- 100.
Ostrovsky, R.; Skeith, W.E., III A survey of single-database private information retrieval: Techniques and Applications. Public Key Cryptogr. 2007, 393–411.
- 101.
Hedayat, A.S.; Sloane, N.J.A.; Stufken, J. Orthogonal Arrays: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 1999.
- 102.
Beimel, A.; Ishai, Y.; Kushilevitz, E.; et al. Breaking the O(n1/(2k−1)) barrier for information-theoretic private information retrieval. In Proceedings of the FOCS 2002, Vancouver, BC, Canada, 16–19 November 2002; pp. 61–270.
- 103.
Grolmusz, V. Superpolynomial size set-systems with restricted intersections mod 6 and explicit Ramsey graphs. Combinatorica 2000, 20, 71–86
- 104.
Zhu, L.; Li,W.M.; Zhang, L.F. On the modulus in matching vector codes. Comput. J. 2022, 65, 2991–2997.
- 105.
Mann, E. Private Access to Distributed Information. Master’s Thesis, Technion-Israel Institute of Technology, Haifa, Israel, 1998.
- 106.
Dvir, Z.; Gopalan, P.; Yekhanin, S.; Matching vector codes. In Proceedings of the FOCS 2010, Las Vegas, NV, USA, 23–26 October 2010; pp. 705–714
- 107.
Bhowmick, A.; Dvir, Z.; Lovett, S. New bounds for matching vector families. In Proceedings of the STOC 2013, Palo Alto, CA, USA, 2–4 June 2013; pp. 823–832
- 108.
Chee, Y.M.; Ling, S.; Wang,H.; et al. Upper bounds on matching families in \(\mathbb{Z}_{pq}^n\). IEEE Trans. Inf. Theory 2013, 59, 5131–5139.
- 109.
Barkol, O.; Ishai,Y.; Weinreb, E. On locally decodable codes, self-correctable codes, and t-private PIR. In Proceedings of the APPROX-RANDOM 2007, Princeton, NJ, USA, 20–22 August 2007; pp. 311–325.