Private Secure Coded Computation

被引:0
|
作者
Kim, Minchul [1 ]
Lee, Jungwoo [1 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 08826, South Korea
关键词
D O I
10.1109/lcomm.2019.2934436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a variation of coded computation that protects the data security and the master's privacy against the workers, which is referred to as private secure coded computation. In private secure coded computation, the master needs to compute a function of its own dataset and one of the datasets in a library exclusively shared by the external workers. After recovering the desired function, the workers should not know which dataset in the library was desired by the master or obtain any information about the master's own data. We propose a private secure coded computation scheme for matrix multiplication, namely private secure polynomial codes, based on private polynomial codes for private coded computation. By simulation, we show that the private secure polynomial codes achieves better computation time than private polynomial codes modified for private secure coded computation.
引用
收藏
页码:1097 / 1101
页数:5
相关论文
共 50 条
  • [1] Private Secure Coded Computation
    Kim, Minchul
    Lee, Jungwoo
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1918 - 1921
  • [2] Two Private Secure Distributed Coded Computation Schemes Using Extension Fields
    Mahesh, Anjana A.
    Malladi, Tushara Swapna
    Rajan, B. Sundar
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [3] Private and Secure Coded Computation in Straggler-Exploiting Distributed Matrix Multiplication
    Yang, Heecheol
    Hong, Sangwoo
    Lee, Jungwoo
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2137 - 2142
  • [4] Secure Distributed Computation on Private Inputs
    Couteau, Geoffroy
    Peters, Thomas
    Pointcheval, David
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 14 - 26
  • [5] Capacity of Private Linear Computation for Coded Databases
    Obead, Sarah A.
    Lin, Hsuan-Yin
    Rosnes, Eirik
    Kliewer, Jorg
    [J]. 2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 813 - 820
  • [6] Private Linear Computation for Noncolluding Coded Databases
    Obead, Sarah A.
    Lin, Hsuan-Yin
    Rosnes, Eirik
    Kliewer, Jorg
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 847 - 861
  • [7] Private Polynomial Computation for Noncolluding Coded Databases
    Obead, Sarah A.
    Lin, Hsuan-Yin
    Rosnes, Eirik
    Kliewer, Jorg
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1677 - 1681
  • [8] Optimizing Secure Computation Programs with Private Conditionals
    Laud, Peeter
    Pankova, Alisa
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 418 - 430
  • [9] Secure Computation with Differentially Private Access Patterns
    Mazloom, Sahar
    Gordon, S. Dov
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 490 - 507
  • [10] Private Polynomial Function Computation for Noncolluding Coded Databases
    Obead, Sarah A.
    Lin, Hsuan-Yin
    Rosnes, Eirik
    Kliewer, Jorg
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1800 - 1813