Field Trace Polynomial Codes for Secure Distributed Matrix Multiplication

Roberto Assis Machado, Rafael G. L. D’Oliveira, Salim El Rouayheb, Daniel Heinlein

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being that the more servers are used, the higher is the communication cost. We show that this is not the case in general. Our central technique relies on adapting results from the literature on repairing Reed-Solomon codes in which, instead of downloading the whole output of a computing task, a user downloads field traces of it. We present Field Trace Polynomial (FTP) codes, a family of codes, that leverage this technique and characterize regimes for which they outperform existing codes in the literature.
Original languageEnglish
Title of host publication2021 17th International Symposium Problems of Redundancy in Information and Control Systems, REDUNDANCY 2021
PublisherIEEE
Pages188-193
Number of pages6
ISBN (Electronic)978-1-6654-3308-2
ISBN (Print)978-1-6654-3309-9
DOIs
Publication statusPublished - 29 Oct 2021
MoE publication typeA4 Article in a conference publication
EventInternational Symposium Problems of Redundancy in Information and Control Systems - Moscow, Russian Federation
Duration: 25 Oct 202129 Oct 2021
Conference number: 17
https://miem.hse.ru/redundancy2021

Conference

ConferenceInternational Symposium Problems of Redundancy in Information and Control Systems
Abbreviated titleREDUNDANCY
Country/TerritoryRussian Federation
CityMoscow
Period25/10/202129/10/2021
Internet address

Keywords

  • Reed-Solomon codes
  • Codes
  • Costs
  • Redundancy
  • Control systems
  • Servers
  • Task analysis

Fingerprint

Dive into the research topics of 'Field Trace Polynomial Codes for Secure Distributed Matrix Multiplication'. Together they form a unique fingerprint.

Cite this