2020
DOI: 10.48550/arxiv.2010.09326
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Symmetric Private Polynomial Computation From Lagrange Encoding

Abstract: The problem of X-secure T -colluding symmetric Private Polynomial Computation (PPC) from coded storage system with B Byzantine and U unresponsive servers is studied in this paper. Specifically, a dataset consisting of M files are stored across N distributed servers according to (N, K + X) Maximum Distance Separable (MDS) codes such that any group of up to X colluding servers can not learn anything about the data files. A user wishes to privately evaluate one out of a set of candidate polynomial functions over … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Coded computing has recently emerged as a technique of utilizing information/coding theoretical tools to inject redundant data and computations into distributed computing systems, to mitigate communication and straggler bottlenecks, and provide security and privacy for various computation tasks (see, e.g., [5], [10], [11], [15], [16], [19], [20], [22]- [30]). Privately retrieving a message from a distributed storage system without revealing the index of the message has been studied extensively in the problem of Private Information Retrieval (PIR) [31]- [37] in recent years.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Coded computing has recently emerged as a technique of utilizing information/coding theoretical tools to inject redundant data and computations into distributed computing systems, to mitigate communication and straggler bottlenecks, and provide security and privacy for various computation tasks (see, e.g., [5], [10], [11], [15], [16], [19], [20], [22]- [30]). Privately retrieving a message from a distributed storage system without revealing the index of the message has been studied extensively in the problem of Private Information Retrieval (PIR) [31]- [37] in recent years.…”
Section: A Related Workmentioning
confidence: 99%
“…Consider the same parameters as Example 1, i.e., V = m = p = n = T = 2. The partitions of matrices A, B (1) , B (2) and the desired computation C (1) = AB (1) are shown in (29) and (30), respectively. Firstly, we use Strassen's construction [43] with bilinear complexity R = 7 to encode the sub-matrices of A and B (1) , B (2) as…”
Section: B Psmm Strategy Based On Lagrange Codesmentioning
confidence: 99%