2021
DOI: 10.1109/jsait.2021.3102882
|View full text |Cite
|
Sign up to set email alerts
|

Degree Tables for Secure Distributed Matrix Multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…In this paper we present two SDMM schemes that work over the complex numbers and show that they can achieve information leakage that is arbitrarily small by a suitable choice of the parameters. These schemes have been previously considered in the context of SDMM over finite fields in [5], [6], [22], but this paper provides a more practical way of using them in the real world. A similar idea of using roots of unity as evaluation points was recently considered in [26], [27] in the context of coded distributed polynomial evaluation.…”
Section: B Motivation and Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper we present two SDMM schemes that work over the complex numbers and show that they can achieve information leakage that is arbitrarily small by a suitable choice of the parameters. These schemes have been previously considered in the context of SDMM over finite fields in [5], [6], [22], but this paper provides a more practical way of using them in the real world. A similar idea of using roots of unity as evaluation points was recently considered in [26], [27] in the context of coded distributed polynomial evaluation.…”
Section: B Motivation and Contributionmentioning
confidence: 99%
“…The following scheme follows the construction of the GASP big code presented in [5]. We use this special case of the more general GASP code presented in [6], since the GASP big code is a subcode of a Generalized Reed-Solomon code with a small dimension. Therefore, it is possible to use a Vandermonde matrix as the generator matrix, which makes it simple to choose the evaluation points of the scheme.…”
Section: B Gasp Code Over Complex Numbersmentioning
confidence: 99%
“…However, in the setting of matrix-matrix multiplication no known scheme achieves this rate. When restricting the encoding to polynomials, better bounds can be obtained by replacing the ideal rate with the lower bounds provided in [42]. We use the ideal scheme to keep our lower bound theoretical and independent from the encoding strategy.…”
Section: A Theoretical Lower Boundmentioning
confidence: 99%
“…• We analyze the time complexity trade-off between the user and the servers when using GASP codes, introduced in [3] and improved on in [4]. They are currently the best polynomial codes in terms of total communication cost.…”
Section: A Main Contributionsmentioning
confidence: 99%