Modular Polynomial Codes for Secure and Robust Distributed Matrix Multiplication

被引:0
作者
Karpuk, David [1 ,2 ]
Tajeddine, Razane [3 ]
机构
[1] WithSecure Corp, W Intelligence, Helsinki 00180, Finland
[2] Aalto Univ, Dept Math & Syst Anal, Espoo 02150, Finland
[3] Univ Helsinki, Dept Comp Sci, Helsinki 00014, Finland
关键词
Data privacy; data security; distributed computing; polynomials; interpolation; CROSS SUBSPACE ALIGNMENT; PRIVATE; CAPACITY; COMPUTATION;
D O I
10.1109/TIT.2024.3380738
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Modular Polynomial (MP) Codes for Secure Distributed Matrix Multiplication (SDMM). The construction is based on the observation that one can decode certain proper subsets of the coefficients of a polynomial with fewer evaluations than is necessary to interpolate the entire polynomial. We also present Generalized Gap Additive Secure Polynomial (GGASP) codes. Both MP and GGASP codes are shown experimentally to perform favorably in terms of recovery threshold when compared to other polynomials codes for SDMM which use the grid partition. Both MP and GGASP codes achieve the recovery threshold of Entangled Polynomial Codes for robustness against stragglers, but MP codes can decode below this recovery threshold depending on the set of worker nodes which fails. The decoding complexity of MP codes is shown to be lower than other approaches in the literature, due to the user not being tasked with interpolating an entire polynomial.
引用
收藏
页码:4396 / 4413
页数:18
相关论文
共 39 条
  • [1] Secure Coded Multi-Party Computation for Massive Matrix Operations
    Akbari-Nodehi, Hanzaleh
    Maddah-Ali, Mohammad Ali
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (04) : 2379 - 2398
  • [2] Private and Secure Distributed Matrix Multiplication With Flexible Communication Load
    Aliasgari, Malihe
    Simeone, Osvaldo
    Kliewer, Jorg
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2722 - 2734
  • [3] Adaptive Private Distributed Matrix Multiplication
    Bitar, Rawad
    Xhemrishi, Marvin
    Wachter-Zeh, Antonia
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2022, 68 (04) : 2653 - 2673
  • [4] Bitar R, 2017, IEEE INT SYMP INFO, P2900, DOI 10.1109/ISIT.2017.8007060
  • [5] FAST MODULAR TRANSFORMS
    BORODIN, A
    MOENCK, R
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1974, 8 (03) : 366 - 386
  • [6] Straggler- and Adversary-Tolerant Secure Distributed Matrix Multiplication Using Polynomial Codes
    Byrne, Eimear
    Gnilke, Oliver W.
    Kliewer, Jorg
    [J]. ENTROPY, 2023, 25 (02)
  • [7] On the Upload versus Download Cost for Secure and Private Matrix Multiplication
    Chang, Wei-Ting
    Tandon, Ravi
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 469 - 473
  • [8] Chang WT, 2018, IEEE GLOB COMM CONF
  • [9] D'Oliveira Rafael G. L., 2021, IEEE Journal on Selected Areas in Information Theory, V2, P907, DOI 10.1109/JSAIT.2021.3102882
  • [10] D'Oliveira RGL, 2020, IEEE CONF COMM NETW, DOI 10.1109/cns48642.2020.9162296