Private Secure Coded Computation

被引:0
|
作者
Kim, Minchul [1 ]
Lee, Jungwoo [1 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 08826, South Korea
关键词
D O I
10.1109/lcomm.2019.2934436
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a variation of coded computation that protects the data security and the master's privacy against the workers, which is referred to as private secure coded computation. In private secure coded computation, the master needs to compute a function of its own dataset and one of the datasets in a library exclusively shared by the external workers. After recovering the desired function, the workers should not know which dataset in the library was desired by the master or obtain any information about the master's own data. We propose a private secure coded computation scheme for matrix multiplication, namely private secure polynomial codes, based on private polynomial codes for private coded computation. By simulation, we show that the private secure polynomial codes achieves better computation time than private polynomial codes modified for private secure coded computation.
引用
收藏
页码:1097 / 1101
页数:5
相关论文
共 50 条
  • [41] Cloud based private data analytic using secure computation over encrypted data
    Zaraket, Christiana
    Hariss, Khalil
    Chamoun, Maroun
    Nicolas, Tony
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (08) : 4931 - 4942
  • [42] From Input Private to Universally Composable Secure Multi-party Computation Primitives
    Bogdanov, Dan
    Laud, Peeter
    Laur, Sven
    Pullonen, Pille
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 184 - 198
  • [43] A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation
    Bernabe-Rodriguez, Julen
    Garreta, Albert
    Lage, Oscar
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [44] Secure Multi-Party Computation in Differential Private Data with Data Integrity Protection
    Sundari, S.
    Ananthi, M.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 180 - 184
  • [45] Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage
    He, Xi
    Machanavajjhala, Ashwin
    Flynn, Cheryl
    Srivastava, Divesh
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1389 - 1406
  • [46] Secure Communication with Coded Wavefronts
    Uppu, Ravitej
    Wolterink, Tom A. W.
    Goorden, Sebastianus A.
    Skoric, Boris
    Mosk, Allard P.
    Pinkse, Pepijn W. H.
    [J]. 2017 CONFERENCE ON LASERS AND ELECTRO-OPTICS EUROPE & EUROPEAN QUANTUM ELECTRONICS CONFERENCE (CLEO/EUROPE-EQEC), 2017,
  • [47] Robust, Private and Secure Cache-Aided Scalar Linear Function Retrieval From Coded Servers
    Yan, Qifa
    Tuninetti, Daniela
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 968 - 981
  • [48] Exploitation of Stragglers in Coded Computation
    Kiani, Shahrzad
    Ferdinand, Nuwan
    Draper, Stark C.
    [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 1988 - 1992
  • [49] Coded Computation for Multicore Setups
    Lee, Kangwook
    Pedarsani, Ramtin
    Papailiopoulos, Dimitris
    Ramchandran, Kannan
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2413 - 2417
  • [50] Coded Computation of Multiple Functions
    Kim, Wilton
    Kruglik, Stanislav
    Kiah, Han Mao
    [J]. 2023 IEEE INFORMATION THEORY WORKSHOP, ITW, 2023, : 468 - 473