1. [1] C. Aguilar-Melchor, J. Barrier, L. Fousse, and M.-O. Killijian. XPIR : Private Information Retrieval for Everyone. In: PoPETs 2016.2 (2016), pp. 155–174.
2. [2] S. Angel and S. Setty. Unobservable Communication over Fully Untrusted Infrastructure. In: OSDI. 2016, pp. 551–569.
3. [3] S. Angel, H. Chen, K. Laine, and S. Setty. PIR with compressed queries and amortized query processing. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy. SP ’18. IEEE Computer Society, 2018.
4. [4] E. Boyle, N. Gilboa, and Y. Ishai. Function Secret Sharing. In: EUROCRYPT 2015, Part II. Vol. 9057. LNCS. Springer, Heidelberg, 2015, pp. 337–367.
5. [5] E. Boyle, N. Gilboa, and Y. Ishai. Function Secret Sharing: Improvements and Extensions. In: ACM CCS 16. ACM Press, 2016, pp. 1292–1303.