2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849524
|View full text |Cite
|
Sign up to set email alerts
|

Private Sequential Function Computation

Abstract: In this paper, we introduce the problem of private sequential function computation, where a user wishes to compute a composition of a sequence of K linear functions, in a specific order, for an arbitrary input. The user does not run these computations locally, rather it exploits the existence of N non-colluding servers, each can compute any of the K functions on any given input. However, the user does not want to reveal any information about the desired order of computations to the servers. For this problem, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…The problem in Fig. 2 is related to private information retrieval (PIR), introduced in [29] and widely studied in recent years, e.g., [30]- [39]. In the PIR problem, the master server wishes to retrieve a message within some library from a set of distributed databases, each of which stores all the messages.…”
Section: B Related Workmentioning
confidence: 99%
“…The problem in Fig. 2 is related to private information retrieval (PIR), introduced in [29] and widely studied in recent years, e.g., [30]- [39]. In the PIR problem, the master server wishes to retrieve a message within some library from a set of distributed databases, each of which stores all the messages.…”
Section: B Related Workmentioning
confidence: 99%
“…Private function evaluation, at first glance, might seem related to private computation [10]- [12] and private information retrieval [13], [14]. However, in private function evaluation, the objective is not to hide the function to be computed (cf., private computation) or the datasets on which the function is evaluated (cf., private information retrieval).…”
Section: Introductionmentioning
confidence: 99%
“…. , ω 10 }, H can be thought of as the parity-check matrix of a[10,7] GRS code with the multipliers {α 1 , . .…”
mentioning
confidence: 99%