The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020 IEEE International Symposium on Information Theory (ISIT) 2020
DOI: 10.1109/isit44484.2020.9174509
|View full text |Cite
|
Sign up to set email alerts
|

Uplink Cost Adjustable Schemes in Secure Distributed Matrix Multiplication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(29 citation statements)
references
References 13 publications
0
29
0
Order By: Relevance
“…Remark 4 (Uplink and downlink loads). Besides downlink load, uplink load is also considered in the distributed matrix-matrix multiplication problem [16]- [18]. In this work, the communication cost of uploading the demand matrix to the server is not a focus, i..e, we assume that each user communicates the whole demand matrix to the server and all other users on a separate channel that is not the bottleneck in the system.…”
Section: Notation Conventionmentioning
confidence: 99%
“…Remark 4 (Uplink and downlink loads). Besides downlink load, uplink load is also considered in the distributed matrix-matrix multiplication problem [16]- [18]. In this work, the communication cost of uploading the demand matrix to the server is not a focus, i..e, we assume that each user communicates the whole demand matrix to the server and all other users on a separate channel that is not the bottleneck in the system.…”
Section: Notation Conventionmentioning
confidence: 99%
“…(Uplink and downlink loads) . Besides downlink load, uplink load is also considered in the distributed matrix-matrix multiplication problem [ 17 , 18 , 19 ]. In this work, the communication cost of uploading the demand matrix to the server is not a focus, i.e, we assume that each user communicates the whole demand matrix to the server and all other users on a separate channel that is not the bottleneck in the system.…”
Section: System Modelmentioning
confidence: 99%
“…For a relatively recent survey on coded computing we refer the reader to [25]. Information-theoretic privacy and straggler mitigation in coded computing (for polynomial evaluation, matrix-matrix and matrix-vector multiplication) is achieved by using secret sharing [26]- [39]. For a very recent survey on private distributed computing and its connections we refer the reader to [40].…”
Section: Introductionmentioning
confidence: 99%