ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761275
|View full text |Cite
|
Sign up to set email alerts
|

The Need for Alignment in Rate-Efficient Distributed Two-Sided Secure Matrix Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Remark 1. The case of s is different from the cases of t and d. When (l ∆ , t, d) is fixed, from security constraint (10) and decodability constraint (11), we see that on one hand, increasing s increases the number of blocks, but on the other hand, it also relaxes the security constraint. When computing nodes are heterogeneous, i.e., computing nodes have different computation cost, upload transmission cost and download transmission cost, the increase in s does not necessarily increase the total cost, because due to the more relaxed security constraint, we can distribute more blocks to computing nodes with lower costs.…”
Section: The Feasible Set Of (T S D)mentioning
confidence: 84%
See 3 more Smart Citations
“…Remark 1. The case of s is different from the cases of t and d. When (l ∆ , t, d) is fixed, from security constraint (10) and decodability constraint (11), we see that on one hand, increasing s increases the number of blocks, but on the other hand, it also relaxes the security constraint. When computing nodes are heterogeneous, i.e., computing nodes have different computation cost, upload transmission cost and download transmission cost, the increase in s does not necessarily increase the total cost, because due to the more relaxed security constraint, we can distribute more blocks to computing nodes with lower costs.…”
Section: The Feasible Set Of (T S D)mentioning
confidence: 84%
“…In this work, we would like to jointly optimize the distribution vector J, and the matrix split parameter (t, s, d, l ∆ ) such that the cost of the user, defined in (17), is minimized. At the same time, the security constraint (10), the decodability constraint (11), the storage constraint (13), and the delay constraint ( 16) must be satisfied.…”
Section: Problem Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…Initially, the research focused on minimizing the download costs for cases where either only one matrix (e.g. A) is private [6] 2 or both matrices A, B ought to be secured [7]- [10], [14]. For the first scenario, the capacity is fully characterized while for the latter scenario only the asymptotic capacity where the ratio of matrix dimensions satisfy n /min(m,p) → ∞ is known.…”
Section: Introductionmentioning
confidence: 99%