On Secure Distributed Linearly Separable Computation

نویسندگان

چکیده

Distributed linearly separable computation, where a user asks some distributed servers to compute function, was recently formulated by the same authors and aims alleviate bottlenecks of stragglers communication cost in computation. The data center assigns subset input datasets each server an uncoded manner, computes coded packets on assigned datasets, which are then sent user. should recover task function from answers servers, such that effect could be tolerated. In this paper, we formulate novel secure framework for aim let only retrieve desired without obtaining any other information about even if it receives all servers. order preserve security common randomness variable independent introduced into transmission. We show non-secure linear-coding based computing scheme original computation problem, can made increasing (number symbols receive). Then focus case server) is minimum minimize size (i.e., size) system while achieving optimal cost. first propose theoretic converse bound size. schemes two well-known assignments, namely fractional repetition assignment xmlns:xlink="http://www.w3.org/1999/xlink">cyclic . These subject using these assignments. Motivated observation general limitation size, with assignment, strictly outperforms above schemes. Some additional optimality results also obtained.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Distributed Human Computation

This paper introduces a line of research on secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans to ...

متن کامل

Secure Distributed Computation on Private Inputs

The recent notion of encryption switching protocol (ESP) allows two players to obliviously switch between two encryption schemes. Instantiated from multiplicatively homomorphic encryption and additively homomorphic encryption, ESPs provide a generic solution to two-party computation and lead to particularly efficient protocols for arithmetic circuits in terms of interaction and communication. I...

متن کامل

On Necessary Conditions for Secure Distributed Computation

What assumptions are required to achieve an unconditionally secure distributed circuit evaluation in a fully connected network? This question was addressed with respect to the allowed number of malicious players [BGW, CCD, RB], given that every channel is unconditionally secure. In this paper we investigate whether the security of all channels is also a necessary condition. [BGW, CCD] showed ho...

متن کامل

Linearly Separable Boolean Function

The maximum absolute value of integral weights sufficient to represent any linearly separable Boolean function is investigated. It is shown that upper bounds exhibited by Muroga (1971) for rational weights satisfying the normalized System of inequalities also hold for integral weights. Therewith, the previous best known upper bound for integers is improved by approximately a factor of 1/2.

متن کامل

Learning Linearly Separable Languages

For a finite alphabet A, we define a class of embeddings of A∗ into an infinite-dimensional feature space X and show that its finitely supported hyperplanes define regular languages. This suggests a general strategy for learning regular languages from positive and negative examples. We apply this strategy to the piecewise testable languages, presenting an embedding under which these are precise...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal on Selected Areas in Communications

سال: 2022

ISSN: ['0733-8716', '1558-0008']

DOI: https://doi.org/10.1109/jsac.2022.3142373