2019
DOI: 10.1109/tifs.2018.2846601
|View full text |Cite
|
Sign up to set email alerts
|

Secure Distributed Computing With Straggling Servers Using Polynomial Codes

Abstract: In this paper, we consider a secure distributed computing scenario in which a master wants to perform matrix multiplication of confidential inputs with multiple workers in parallel. In such a setting, a master does not want to reveal information about the two input matrices to the workers in an information-theoretic sense. We propose a secure distributed computing scheme that can efficiently cope with straggling effects by applying polynomial codes on sub-tasks assigned to workers. The achievable recovery thre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
61
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 116 publications
(62 citation statements)
references
References 21 publications
1
61
0
Order By: Relevance
“…The main result recovers prior art, including [19]- [21]. Among topics for future work, we mention here the establishment of matching converse bounds [16] and the consideration of impairments in the communication channel between workers [25].…”
Section: A Secure Generalized Polydot Code: the S < T Casesupporting
confidence: 70%
“…The main result recovers prior art, including [19]- [21]. Among topics for future work, we mention here the establishment of matching converse bounds [16] and the consideration of impairments in the communication channel between workers [25].…”
Section: A Secure Generalized Polydot Code: the S < T Casesupporting
confidence: 70%
“…Codes for privacy and straggler mitigation in distributed computing are first introduced in [3,26] where the authors consider a homogeneous setting and focus on matrixvector multiplication. The problem of private distributed matrix-matrix multiplication and private polynomial computation with straggler tolerance is studied [23,[55][56][57][58][59]. In the private matrix-matrix multiplication setting, the master wants to simultaneously maintain the privacy of both matrices which is a generalization of the matrix-vector multiplication setting.…”
Section: Related Workmentioning
confidence: 99%
“…For P C ≥ 1 this implies the recovery threshold P R in (22). The communication load C L in (16) follows from the fact that there…”
Section: A Secure Generalized Polydot Code: the S < T Casementioning
confidence: 99%