Detailed Information

Cited 3 time in webofscience Cited 0 time in scopus
Metadata Downloads

Private Coded Matrix Multiplication

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Minchul-
dc.contributor.authorYang, Heecheol-
dc.contributor.authorLee, Jungwoo-
dc.date.available2021-02-23T05:40:15Z-
dc.date.created2021-02-23-
dc.date.issued2020-
dc.identifier.issn1556-6013-
dc.identifier.urihttps://scholarworks.bwise.kr/kumoh/handle/2020.sw.kumoh/18579-
dc.description.abstractIn distributed computing system for the master-worker framework, an erasure code is able to mitigate the effects of slow workers, also called stragglers. The distributed computing system combined with coding is referred to as coded computation. For a matrix multiplication, we consider a variation of coded computation that ensures the master's privacy from the workers, which is referred to as private coded matrix multiplication. In the private coded matrix multiplication, the master needs to compute a matrix multiplication on its own matrix and one of the matrices in a library exclusively shared by the external workers. After the master recovers the matrix multiplication through coded matrix multiplication, the workers should not know which matrix in the library was desired by the master, which implies that the master's privacy is ensured. Our problem is a special case of linear private computation, where a linear combination of matrices in the library should be concealed. We propose a private coded matrix multiplication scheme, based on the conventional coded matrix multiplication scheme. In terms of computation time and communication load, we compare our proposed scheme with a conventional robust private information retrieval scheme and private computation schemes.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titlePrivate Coded Matrix Multiplication-
dc.typeArticle-
dc.contributor.affiliatedAuthorYang, Heecheol-
dc.identifier.doi10.1109/TIFS.2019.2940895-
dc.identifier.wosid000560278000001-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.1434 - 1443-
dc.relation.isPartOfIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.titleIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.citation.volume15-
dc.citation.startPage1434-
dc.citation.endPage1443-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusINFORMATION-RETRIEVAL-
dc.subject.keywordPlusCAPACITY-
dc.subject.keywordAuthorLibraries-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorEncoding-
dc.subject.keywordAuthorDistributed computing-
dc.subject.keywordAuthorData privacy-
dc.subject.keywordAuthorArtificial intelligence-
dc.subject.keywordAuthorDatabases-
dc.subject.keywordAuthorDistributed computing-
dc.subject.keywordAuthorcoded computation-
dc.subject.keywordAuthorprivate information retrieval-
dc.subject.keywordAuthorerasure codes-
dc.subject.keywordAuthorinformation theory-
dc.subject.keywordAuthorprivacy-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Electronic Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE