Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier

被引:0
|
作者
Yu, Qian [1 ]
Avestimehr, A. Salman [1 ]
机构
[1] Univ Southern Calif, ECE Dept, Los Angeles, CA 90089 USA
关键词
D O I
10.1109/isit44484.2020.9174167
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In distributed matrix multiplication, a common scenario is to assign each worker a fraction of the multiplication task, by partitioning the input matrices into smaller submatrices. In particular, by dividing two input matrices into m-by-p and p-by-n subblocks, a single multiplication task can be viewed as computing linear combinations of pmn submatrix products, which can be assigned to pmn workers. Such block-partitioning based designs have been widely studied under the topics of secure, private, and batch computation, where the state of the arts all require computing at least "cubic" (pmn) number of submatrix multiplications. Entangled polynomial codes, first presented for straggler mitigation, provides a powerful method for breaking the cubic barrier. It achieves a subcubic recovery threshold, meaning that the final product can be recovered from any subset of multiplication results with a size order-wise smaller than pmn. In this work, we show that entangled polynomial codes can be further extended to also include these three important settings, and provide a unified framework that order-wise reduces the total computational costs upon the state of the arts by achieving subcubic recovery thresholds. A full version of this paper is accessible at: bit.ly/qyuEntang
引用
收藏
页码:245 / 250
页数:6
相关论文
共 50 条
  • [21] Folded Polynomial Codes for Coded Distributed AAinverted perpendicular-Type Matrix Multiplication
    Xu, Jingke
    Zhang, Yaqian
    Wang, Libo
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (09) : 5051 - 5064
  • [22] GCSA codes with noise alignment for secure coded multi-party batch matrix multiplication
    Chen Z.
    Jia Z.
    Wang Z.
    Jafar S.A.
    [J]. IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 306 - 316
  • [23] GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
    Chen, Zhen
    Jia, Zhuqing
    Wang, Zhiying
    Jafar, Syed A.
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 227 - 232
  • [24] Private and Secure Distributed Matrix Multiplication Schemes for Replicated or MDS-Coded Servers
    Li, Jie
    Hollanti, Camilla
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 659 - 669
  • [25] Degree Tables for Secure Distributed Matrix Multiplication
    D'Oliveira, Rafael G. L.
    El Rouayheb, Salim
    Heinlein, Daniel
    Karpuk, David
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 414 - 418
  • [26] Secure Batch Matrix Multiplication From Grouping Lagrange Encoding
    Zhu, Jinbao
    Tang, Xiaohu
    [J]. IEEE COMMUNICATIONS LETTERS, 2021, 25 (04) : 1119 - 1123
  • [27] Notes on Communication and Computation in Secure Distributed Matrix Multiplication
    D'Oliveira, Rafael G. L.
    El Rouayheb, Salim
    Heinlein, Daniel
    Karpuk, David
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [28] On the Upload versus Download Cost for Secure and Private Matrix Multiplication
    Chang, Wei-Ting
    Tandon, Ravi
    [J]. 2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 469 - 473
  • [29] Fully private and secure coded matrix multiplication with colluding workers
    Kim, Minchul
    Yang, Heecheol
    Lee, Jungwoo
    [J]. ICT EXPRESS, 2023, 9 (04): : 722 - 727
  • [30] Secure Distributed Computing With Straggling Servers Using Polynomial Codes
    Yang, Heecheol
    Lee, Jungwoo
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (01) : 141 - 150