2019
DOI: 10.48550/arxiv.1910.13849
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Uplink-Downlink Tradeoff in Secure Distributed Matrix Multiplication

Abstract: In secure distributed matrix multiplication (SDMM) the multiplication AB from two private matrices A and B is outsourced by a user to N distributed servers. In -SDMM, the goal is to a design a joint communication-computation procedure that optimally balances conflicting communication and computation metrics without leaking any information on both A and B to any set of ≤ N servers. To this end, the user applies coding with Ãi and Bi representing encoded versions of A and B destined to the i-th server. Now, SDMM… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Hence, now we only need to focus on the first stage where we aim to minimize the number of totally transmitted linearly independent combinations (i.e., λ) for the (N, N, N r , 1, M ) non-secure distributed linearly separable computation problem (for the sake of simplicity, we will call it (N, M ) non-secure problem since N r = N − M + 1). Notice that if in the first stage F is chosen as that in (15) where all elements outside the first line are chosen i.i.d. over F q , the computing scheme becomes the scheme with the cyclic assignment for Theorem 5.…”
Section: Is Proved Inmentioning
confidence: 99%
“…Hence, now we only need to focus on the first stage where we aim to minimize the number of totally transmitted linearly independent combinations (i.e., λ) for the (N, N, N r , 1, M ) non-secure distributed linearly separable computation problem (for the sake of simplicity, we will call it (N, M ) non-secure problem since N r = N − M + 1). Notice that if in the first stage F is chosen as that in (15) where all elements outside the first line are chosen i.i.d. over F q , the computing scheme becomes the scheme with the cyclic assignment for Theorem 5.…”
Section: Is Proved Inmentioning
confidence: 99%
“…Remark 4 (Uplink and downlink loads). Besides downlink load, uplink load is also considered in the distributed matrix-matrix multiplication problem [16]- [18]. In this work, the communication cost of uploading the demand matrix to the server is not a focus, i..e, we assume that each user communicates the whole demand matrix to the server and all other users on a separate channel that is not the bottleneck in the system.…”
Section: System Modelmentioning
confidence: 99%
“…The information theft by the distributed computing nodes can be modeled by the collusion pattern, which has also been studied in problems of secret sharing [12] and private information retrieval [13,14]. Some of the existing literature has studied the SDMM problem under homogeneous collusion patterns, where up to l computing nodes may collude to obtain the information of the two input matrices [9,[15][16][17][18]. To balance the tradeoff between the uplink and downlink cost, the works proposed two schemes based on the secure cross subspace alignment [15].…”
Section: Introductionmentioning
confidence: 99%