2018
DOI: 10.48550/arxiv.1806.00939
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy

Abstract: We consider a scenario involving computations over a massive dataset stored distributedly across multiple workers, which is at the core of distributed learning algorithms. We propose Lagrange Coded Computing (LCC), a new framework to simultaneously provide (1) resiliency against stragglers that may prolong computations; (2) security against Byzantine (or malicious) workers that deliberately modify the computation for their benefit; and (3) (information-theoretic) privacy of the dataset amidst possible collusio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
93
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(95 citation statements)
references
References 40 publications
1
93
0
Order By: Relevance
“…The sharing must be such that if any subset of T servers collude, they gain no information about the input data. Various approaches, such as ramp sharing [61] and Lagrange sharing [51] have been proposed for such sharing. In this paper, we use Lagrange Sharing [51], which works as follows:…”
Section: B Lagrange Sharing [51]mentioning
confidence: 99%
See 2 more Smart Citations
“…The sharing must be such that if any subset of T servers collude, they gain no information about the input data. Various approaches, such as ramp sharing [61] and Lagrange sharing [51] have been proposed for such sharing. In this paper, we use Lagrange Sharing [51], which works as follows:…”
Section: B Lagrange Sharing [51]mentioning
confidence: 99%
“…Various approaches, such as ramp sharing [61] and Lagrange sharing [51] have been proposed for such sharing. In this paper, we use Lagrange Sharing [51], which works as follows:…”
Section: B Lagrange Sharing [51]mentioning
confidence: 99%
See 1 more Smart Citation
“…If (s + 1) n, the worst case occurs when all workers corresponding to blocks of B C1 and − 1 blocks of B C2 respond, along with only one worker from either of the two remaining blocks. By (11), the total number of responsive workers is n − s. In the best case, we need a single worker corresponding to each block of B C2 to respond, i.e., = n s+1 responsive workers. Similarly, if (s + 1) | n, in the best case we require = n s+1 workers to respond, and in the worst case n − ( − 1) • (s + 1) + 1 = n − s many workers.…”
Section: B Decoding As a Streaming Processmentioning
confidence: 99%
“…PolyShard is inspired by recent developments in coded computing [12]- [20], in particular Lagrange Coded Computing [20], which provides a transformative framework for injecting computation redundancy in unorthodox coded forms in order to deal with failures and errors in distributed computing. The key idea behind PolyShard is that instead of storing and processing a single uncoded shard as in convention, each node stores and computes on a coded shard of the same size that is generated by linearly mixing uncoded shards, using the well-known Lagrange polynomial.…”
Section: Introductionmentioning
confidence: 99%