Coded Computing for Secure Boolean Computations

被引:10
作者
Yang, Chien-Sheng [1 ]
Avestimehr, A. Salman [1 ]
机构
[1] Univ Southern Calif, Dept Elect & Comp Engn, Los Angeles, CA 90089 USA
来源
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY | 2021年 / 2卷 / 01期
关键词
Boolean function; coded computing; distributed computing; PERCEPTRON; MODEL;
D O I
10.1109/JSAIT.2021.3055341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit. Boolean functions are the key components of many applications, e.g., verification functions in blockchain systems and design of cryptographic algorithms. We consider the problem of computing a Boolean function in a distributed computing system with particular focus on security against Byzantine workers. Any Boolean function can be modeled as a multivariate polynomial with high degree in general. However, the security threshold (i.e., the maximum number of adversarial workers can be tolerated such that the correct results can be obtained) provided by the recent proposed Lagrange Coded Computing (LCC) can be extremely low if the degree of the polynomial is high. We propose three different schemes called coded Algebraic normal form (ANF), coded Disjunctive normal form (DNF) and coded polynomial threshold function (PTF). The key idea of the proposed schemes is to model it as the concatenation of some low-degree polynomials and threshold functions. In terms of the security threshold, we show that the proposed coded ANF and coded DNF are optimal by providing a matching outer bound.
引用
收藏
页码:326 / 337
页数:12
相关论文
共 62 条
[1]  
Abadi Martin, 2016, Proceedings of OSDI '16: 12th USENIX Symposium on Operating Systems Design and Implementation. OSDI '16, P265
[2]  
Nodehi HA, 2020, Arxiv, DOI arXiv:1908.04255
[3]   Polynomial Representations of Threshold Functions and Algorithmic Applications [J].
Alman, Josh ;
Chan, Timothy M. ;
Williams, Ryan .
2016 IEEE 57TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2016, :467-476
[4]  
Amano K, 2010, LECT NOTES COMPUT SC, V6506, P304, DOI 10.1007/978-3-642-17517-6_28
[5]  
[Anonymous], 2020, arXiv:2010.00217
[6]   THE EXPRESSIVE POWER OF VOTING POLYNOMIALS [J].
ASPNES, J ;
BEIGEL, R ;
FURST, M ;
RUDICH, S .
COMBINATORICA, 1994, 14 (02) :135-148
[7]  
Bajric S., 2019, Modern Cryptography, DOI [10.5772/intechopen.85023, DOI 10.5772/INTECHOPEN.85023]
[8]   NONBINARY BCH DECODING [J].
BERLEKAMP, ER .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1968, 14 (02) :242-+
[9]  
Blanchard P, 2017, ADV NEUR IN, V30
[10]   PERCEPTRON - A MODEL FOR BRAIN FUNCTIONING .1. [J].
BLOCK, HD .
REVIEWS OF MODERN PHYSICS, 1962, 34 (01) :123-&