2018 IEEE Information Theory Workshop (ITW) 2018
DOI: 10.1109/itw.2018.8613446
|View full text |Cite
|
Sign up to set email alerts
|

Entangled Polynomial Coding in Limited-Sharing Multi-Party Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
65
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 34 publications
(65 citation statements)
references
References 4 publications
0
65
0
Order By: Relevance
“…In addition, it was presented in CTW 2018 in May 2018. We also presented a generalized version of [1] in [21].…”
Section: A Concurrent and Follow-up Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it was presented in CTW 2018 in May 2018. We also presented a generalized version of [1] in [21].…”
Section: A Concurrent and Follow-up Resultsmentioning
confidence: 99%
“…In addition, overall, the min{2pmn + 2t − 3, mpn + 2mp + np + nt − 2n − 2p + 1} coefficients in this polynomial is not zero. Thus if the number of workers is at least min{2pmn + 2t − 3, mpn + 2mp + np + nt − 2n − 2p + 1}, similar to Theorem 3, we can calculate C. Similar procedures in Section VII, we can calculate any polynomial function G, satisfying constraints (1), (2), and (3) (see [21]).…”
Section: Extensionmentioning
confidence: 97%
“…Coded computing has recently emerged as a technique of utilizing information/coding theoretical tools to inject redundant data and computations into distributed computing systems, to mitigate communication and straggler bottlenecks, and provide security and privacy for various computation tasks (see, e.g., [5], [10], [11], [15], [16], [19], [20], [22]- [30]). Privately retrieving a message from a distributed storage system without revealing the index of the message has been studied extensively in the problem of Private Information Retrieval (PIR) [31]- [37] in recent years.…”
Section: A Related Workmentioning
confidence: 99%
“…To the best of our knowledge, the state-of-the-art strategies for SMM with arbitrary partitioning of matrices above can be divided into two categories in terms of coding techniques, i.e., SMM based on polynomial codes [11], [15] and SMM based on Lagrange codes [16]. The essential components behind these coded strategies lie in constructing the encoding functions of matrices A and B, denoted by f (x) and h(x) respectively, such that the desired products of sub-matrices…”
Section: I(y(αmentioning
confidence: 99%
See 1 more Smart Citation