Coded Computing for Secure Boolean Computations

被引:10
作者
Yang, Chien-Sheng [1 ]
Avestimehr, A. Salman [1 ]
机构
[1] Univ Southern Calif, Dept Elect & Comp Engn, Los Angeles, CA 90089 USA
来源
IEEE JOURNAL ON SELECTED AREAS IN INFORMATION THEORY | 2021年 / 2卷 / 01期
关键词
Boolean function; coded computing; distributed computing; PERCEPTRON; MODEL;
D O I
10.1109/JSAIT.2021.3055341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit. Boolean functions are the key components of many applications, e.g., verification functions in blockchain systems and design of cryptographic algorithms. We consider the problem of computing a Boolean function in a distributed computing system with particular focus on security against Byzantine workers. Any Boolean function can be modeled as a multivariate polynomial with high degree in general. However, the security threshold (i.e., the maximum number of adversarial workers can be tolerated such that the correct results can be obtained) provided by the recent proposed Lagrange Coded Computing (LCC) can be extremely low if the degree of the polynomial is high. We propose three different schemes called coded Algebraic normal form (ANF), coded Disjunctive normal form (DNF) and coded polynomial threshold function (PTF). The key idea of the proposed schemes is to model it as the concatenation of some low-degree polynomials and threshold functions. In terms of the security threshold, we show that the proposed coded ANF and coded DNF are optimal by providing a matching outer bound.
引用
收藏
页码:326 / 337
页数:12
相关论文
共 62 条
[11]   RANK-R DECISION TREES ARE A SUBCLASS OF R-DECISION LISTS [J].
BLUM, A .
INFORMATION PROCESSING LETTERS, 1992, 42 (04) :183-185
[12]  
Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
[13]   Strong 8-bit Sboxes with Efficient Masking in Hardware [J].
Boss, Erik ;
Grosso, Vincent ;
Gueneysu, Tim ;
Leander, Gregor ;
Moradi, Amir ;
Schneider, Tobias .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 :171-193
[14]   A NEARLY OPTIMAL LOWER BOUND ON THE APPROXIMATE DEGREE OF AC0 [J].
Bun, Mark ;
Thaler, Justin .
SIAM JOURNAL ON COMPUTING, 2020, 49 (04)
[15]  
Carlet C, 2010, COMPUT SCI ENG, P257
[16]  
Chen Lingjiao, 2018, P MACHINE LEARNING R, V80
[17]  
Cramer R., 2015, Secure Multiparty Computation and Secret Sharing
[18]  
Cusick TW, 2017, CRYPTOGRAPHIC BOOLEAN FUNCTIONS AND APPLICATIONS, 2ND EDITION, P1
[19]  
Dutta S., 2016, P ADV NEUR INF PROC, P2100
[20]  
Sezener CE, 2015, Arxiv, DOI arXiv:1504.01167