Privacy-Preserving Polynomial Computing Over Distributed Data

09/17/2023
by   Zhiquan Tan, et al.
0

In this letter, we delve into a scenario where a user aims to compute polynomial functions using their own data as well as data obtained from distributed sources. To accomplish this, the user enlists the assistance of N distributed workers, thereby defining a problem we refer to as privacy-preserving polynomial computing over distributed data. To address this challenge, we propose an approach founded upon Lagrange encoding. Our method not only possesses the ability to withstand the presence of stragglers and byzantine workers but also ensures the preservation of security. Specifically, even if a coalition of X workers collude, they are unable to acquire any knowledge pertaining to the data originating from the distributed sources or the user.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/04/2018

Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy

We consider a distributed computing scenario that involves computations ...
research
07/27/2021

Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

Stragglers, Byzantine workers, and data privacy are the main bottlenecks...
research
03/09/2023

FedREP: A Byzantine-Robust, Communication-Efficient and Privacy-Preserving Framework for Federated Learning

Federated learning (FL) has recently become a hot research topic, in whi...
research
10/20/2021

Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge Caching

Mobile edge computing (MEC) is a prominent computing paradigm which expa...
research
05/11/2023

Adaptive Privacy-Preserving Coded Computing With Hierarchical Task Partitioning

Distributed computing is known as an emerging and efficient technique to...
research
05/11/2023

Probabilistic Group Testing in Distributed Computing with Attacked Workers

The problem of distributed matrix-vector product is considered, where th...
research
03/29/2018

Privacy-preserving Sensory Data Recovery

In recent years, a large scale of various wireless sensor networks have ...

Please sign up or login with your details

Forgot password? Click here to reset