2019
DOI: 10.1109/access.2019.2908024
|View full text |Cite
|
Sign up to set email alerts
|

On the Capacity and Straggler-Robustness of Distributed Secure Matrix Multiplication

Abstract: Computationally efficient matrix multiplication is a fundamental requirement in various fields, including and particularly in data analytics. To do so, the computation task of large-scale matrix multiplication is typically outsourced to multiple servers. However, due to data misusage at the servers, security is typical of concern. In this paper, we first study the two-sided secure matrix multiplication problem, where a user is interested in the matrix product AB of two finite field private matrices A and B fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(48 citation statements)
references
References 17 publications
0
47
0
Order By: Relevance
“…To see this in a bit more detail, recall that the idea of cross-subspace alignment originated in the context of XS-TPIR [29], [30] as a way to align interference from undesired product terms that result when a secret-shared (private) query vector is multiplied with a secretshared (secure) data vector. It was then observed in [29], [44], [61], [64], [65] that the idea of aligning undesired product terms is similarly useful in distributed computing applications, which led to a crossover of CSA codes to coded distributed computing [66]. Generalized CSA codes were constructed in [61] to unify and improve upon several state-of-art CDC approaches like Lagrange Coded Computing [67] and Entangled Polynomial codes [68].…”
Section: Introductionmentioning
confidence: 99%
“…To see this in a bit more detail, recall that the idea of cross-subspace alignment originated in the context of XS-TPIR [29], [30] as a way to align interference from undesired product terms that result when a secret-shared (private) query vector is multiplied with a secretshared (secure) data vector. It was then observed in [29], [44], [61], [64], [65] that the idea of aligning undesired product terms is similarly useful in distributed computing applications, which led to a crossover of CSA codes to coded distributed computing [66]. Generalized CSA codes were constructed in [61] to unify and improve upon several state-of-art CDC approaches like Lagrange Coded Computing [67] and Entangled Polynomial codes [68].…”
Section: Introductionmentioning
confidence: 99%
“…• When p = 1 and m = n, the recovery threshold of the new code C SDMM is less than that of the Chang-Tandon code in [12]. • The new code C SDMM subsumes the Yang-Lee code [14] as a special case by setting p = X = 1 and subsumes the Kakar et al code 1 [13] as a special case by setting p = 1. • From Table III, it is seen that to compare the performances of the new code C SDMM and the SGPD code in [16], it is equivalent to compare their recovery thresholds.…”
Section: Comparisonsmentioning
confidence: 99%
“…Yang and Lee [14] proposed SDMM codes in the case of no collusion (X = 1). Kakar et al [13] and D'Oliveira et al [10], [11] further provided more efficient constructions over that of Chang and Tandon. Based on the entangled polynomial code [9], Aliasgari et al [16] presented more flexible SDMM codes.…”
Section: A Related Workmentioning
confidence: 99%
“…In [18], [25], coded schemes have been used to develop multi-party computation techniques to calculate arbitrary polynomials of massive matrices, preserving security of the data matrices. In [20], [21], [23] a reduction of the communication load is obtained by extending polynomial codes. While these works focus on either minimizing recovery threshold or communication load, the trade-off between these two fundamental quantities has not been addressed in the open literature to the best of our knowledge.…”
Section: B Related Workmentioning
confidence: 99%
“…As we will discuss, the projection of this set onto the plane defined by the condition P C = 0 includes the set of pairs (P R , C L ) in (15) and (16) obtained by the GPD code [14]. The proposed secure GPD (SGPD) code augments matrices A and B by adding P C random block matrices to the input matrices A and B, in a manner similar to prior works [18]- [21], [23], yielding augmented matrices A * and B * . As we will see, a direct application of the GPD codes to these matrices is suboptimal.…”
Section: Secure Polydot Codementioning
confidence: 99%