Secure Coded Multi-Party Computation for Massive Matrix Operations
نویسندگان
چکیده
In this article, we consider a secure multi-party computation problem (MPC), where the goal is to offload of an arbitrary polynomial function some massive private matrices (inputs) cluster workers. The workers are not reliable. Some them may collude gain information about input data (semi-honest workers). system initialized by sharing (randomized) each matrix server. Since massive, share's size assumed be at most 1/k fraction matrix, for k ∈ \mathbb N. objective minimize number needed perform task correctly, such that even if subset t-1 workers, t N, collude, they cannot any matrices. We propose scheme, called sharing, and show it admits basic operations as adding multiplication transposing matrix. By concatenating procedures operations, can calculated, subject constraints. proposed scheme offer order-wise in terms needed, compared approaches formed concatenation job splitting conventional MPC approaches.
منابع مشابه
Unconditionally Secure Multi-Party Computation
The most general type of multi-party computation involves n participants. Participant i supplies private data xi and obtains an output function fi(x1, . . . , xn). The computation is said to be unconditionally secure if each participant can verify, with probability arbitrarily close to one, that every other participant obtains arbitrarily little information beyond their agreed output fi. We giv...
متن کاملHeterogeneous Secure Multi-Party Computation
The increased processing power and storage capacity of inhome and mobile computing devices has motivated their inclusion in distributed and cloud computing systems. The resulting diverse environment creates a strong requirement for secure computations, which can be realised by Secure Multi-Party Computation (MPC). However, MPC most commonly assumes that parties performing the secure computation...
متن کاملEfficient Secure Multi-party Computation
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...
متن کاملAssisting Server for Secure Multi-Party Computation
Distributed threats like botnets are among the most serious threats in the Internet. Due to their distributed nature, these attacks are difficult to detect in an early stage without the collaboration of several network operators. However, the exchange of monitoring data between different parties turns out to be difficult in practice, due to the desire of operators not to disclose network intern...
متن کاملSecure Numerical and Logical Multi Party Operations
We derive algorithms for efficient secure numerical and logical operations in the semi-honest model ensuring statistical or perfect security. We focus on a recently introduced scheme for secure multi-party computation [14]. To derive our algorithms for trigonometric functions, we use basic mathematical laws in combination with properties of the additive encryption scheme in a novel way. For div...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2021
ISSN: ['0018-9448', '1557-9654']
DOI: https://doi.org/10.1109/tit.2021.3050853