1. Angel, S., Setty, S.: Unobservable communication over fully untrusted infrastructure. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pp. 551–569 (2016)
2. Lecture Notes in Computer Science;A Beimel,2001
3. Beimel, A., Ishai, Y., Kushilevitz, E.: General constructions for information-theoretic private information retrieval. J. Comput. Syst. Sci. 71(2), 213–247 (2005)
4. Beimel, A., Ishai, Y., Kushilevitz, E., Raymond, J.F.: Breaking the O($$n^{1/(2k-1)}$$) barrier for information-theoretic private information retrieval. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, pp. 261–270. IEEE (2002)
5. Lecture Notes in Computer Science;A Beimel,2003