Private Coded Matrix Multiplication
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Minchul | - |
dc.contributor.author | Yang, Heecheol | - |
dc.contributor.author | Lee, Jungwoo | - |
dc.date.available | 2021-02-23T05:40:15Z | - |
dc.date.created | 2021-02-23 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/kumoh/handle/2020.sw.kumoh/18579 | - |
dc.description.abstract | In distributed computing system for the master-worker framework, an erasure code is able to mitigate the effects of slow workers, also called stragglers. The distributed computing system combined with coding is referred to as coded computation. For a matrix multiplication, we consider a variation of coded computation that ensures the master's privacy from the workers, which is referred to as private coded matrix multiplication. In the private coded matrix multiplication, the master needs to compute a matrix multiplication on its own matrix and one of the matrices in a library exclusively shared by the external workers. After the master recovers the matrix multiplication through coded matrix multiplication, the workers should not know which matrix in the library was desired by the master, which implies that the master's privacy is ensured. Our problem is a special case of linear private computation, where a linear combination of matrices in the library should be concealed. We propose a private coded matrix multiplication scheme, based on the conventional coded matrix multiplication scheme. In terms of computation time and communication load, we compare our proposed scheme with a conventional robust private information retrieval scheme and private computation schemes. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Private Coded Matrix Multiplication | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yang, Heecheol | - |
dc.identifier.doi | 10.1109/TIFS.2019.2940895 | - |
dc.identifier.wosid | 000560278000001 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.1434 - 1443 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.volume | 15 | - |
dc.citation.startPage | 1434 | - |
dc.citation.endPage | 1443 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | INFORMATION-RETRIEVAL | - |
dc.subject.keywordPlus | CAPACITY | - |
dc.subject.keywordAuthor | Libraries | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | Encoding | - |
dc.subject.keywordAuthor | Distributed computing | - |
dc.subject.keywordAuthor | Data privacy | - |
dc.subject.keywordAuthor | Artificial intelligence | - |
dc.subject.keywordAuthor | Databases | - |
dc.subject.keywordAuthor | Distributed computing | - |
dc.subject.keywordAuthor | coded computation | - |
dc.subject.keywordAuthor | private information retrieval | - |
dc.subject.keywordAuthor | erasure codes | - |
dc.subject.keywordAuthor | information theory | - |
dc.subject.keywordAuthor | privacy | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
350-27, Gumi-daero, Gumi-si, Gyeongsangbuk-do, Republic of Korea (39253)054-478-7170
COPYRIGHT 2020 Kumoh University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.