The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.48550/arxiv.2205.07052
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

General Framework for Linear Secure Distributed Matrix Multiplication with Byzantine Servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Most SDMM schemes in the literature follow some kind of linear structure, where the encoded matrices are obtained as linear combinations of the matrices and some random noise that is added. This structure has been presented as a general framework called linear SDMM in [14]. We shall present our contributions using the help of this framework.…”
Section: Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Most SDMM schemes in the literature follow some kind of linear structure, where the encoded matrices are obtained as linear combinations of the matrices and some random noise that is added. This structure has been presented as a general framework called linear SDMM in [14]. We shall present our contributions using the help of this framework.…”
Section: Preliminariesmentioning
confidence: 99%
“…In [14] it was shown that a linear SDMM scheme is secure against X-collusion if F >m and G >n generate MDS codes.…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…For small numbers of stragglers [20] constructs schemes that outperform the entangled polynomial scheme. Recently, several attempts have been made to design coding schemes to further reduce upload and download rates, the recovery threshold, and computational complexity for both workers and server (see, for example, [21][22][23][24][25][26][27]). For example, in [21], bivariate polynomial codes were used to reduce the recovery threshold in specific cases.…”
Section: Introductionmentioning
confidence: 99%