-
HerA Scheme: Secure Distributed Matrix Multiplication via Hermitian Codes
Authors:
Roberto A. Machado,
Gretchen L. Matthews,
Welington Santos
Abstract:
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers the inner product partition for matrices $A$ and…
▽ More
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers the inner product partition for matrices $A$ and $B$. Our central technique relies on encoding matrices $A$ and $B$ in a Hermitian code and its dual code, respectively. We present the Hermitian Algebraic (HerA) scheme, which employs Hermitian codes and characterizes the partitioning and security capacities given entries of matrices belonging to a finite field with $q^2$ elements. We showcase that this scheme performs the secure distributed matrix multiplication in a significantly smaller finite field and expands security allowances compared to the existing results in the literature.
△ Less
Submitted 15 May, 2023; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition Case
Authors:
Roberto Assis Machado,
Felice Manganiello
Abstract:
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers a grid product partition for matrices $A$ and $B$,…
▽ More
We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of $N$ honest but curious servers under the security constraint that any information about either $A$ or $B$ is not leaked to any server. This paper presents a \emph{new scheme} that considers a grid product partition for matrices $A$ and $B$, which achieves an upload cost significantly lower than the existing results in the literature. Since the grid partition is a general partition that incorporates the inner and outer ones, it turns out that the communication load of the proposed scheme matches the best-known protocols for those extreme cases.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
Field Trace Polynomial Codes for Secure Distributed Matrix Multiplication
Authors:
Roberto Assis Machado,
Rafael G. L. D'Oliveira,
Salim El Rouayheb,
Daniel Heinlein
Abstract:
We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being, that the more servers used, the higher the communication cost. We show that this is not the case. Our central technique relies on adapting results from the literature on…
▽ More
We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being, that the more servers used, the higher the communication cost. We show that this is not the case. Our central technique relies on adapting results from the literature on repairing Reed-Solomon codes where instead of downloading the whole of the computing task, a user downloads field traces of these computations. We present field trace polynomial codes, a family of codes, that explore this technique and characterize regimes for which our codes outperform the existing codes in the literature.
△ Less
Submitted 9 June, 2022; v1 submitted 19 August, 2021;
originally announced August 2021.
-
Weights which respect support and NN-decoding
Authors:
Roberto Assis Machado,
Marcelo Firer
Abstract:
In this work we explore a family of metrics over finite fields which respect the support of vectors. We show how these metrics can be obtained from the edge-weighted Hamming cube and, based on this representation we give a description of a group of linear isometries (with respect to the metric). Next we introduce the concept of conditional sum of metrics and determine what conditions determine a m…
▽ More
In this work we explore a family of metrics over finite fields which respect the support of vectors. We show how these metrics can be obtained from the edge-weighted Hamming cube and, based on this representation we give a description of a group of linear isometries (with respect to the metric). Next we introduce the concept of conditional sum of metrics and determine what conditions determine a metric respecting support, out of two such given metrics. Finally we introduce the labeled-poset block metrics, a new family of metrics which respects support of vector, filling a gap existing in the known such metrics. For this family we give a full description of the group of linear isometries and determine necessary and sufficient conditions for the existence of a MacWilliams identity.
△ Less
Submitted 19 January, 2019; v1 submitted 20 April, 2018;
originally announced April 2018.
-
Combinatorial metrics: MacWilliams-type identities, isometries and extension property
Authors:
Jerry Anderson Pinheiro,
Roberto Assis Machado,
Marcelo Firer
Abstract:
In this work we characterize the combinatorial metrics admitting a MacWilliams-type identity and describe the group of linear isometries of such metrics. Considering coverings that are not connected, we classify the metrics satisfying the MacWilliams extension property.
In this work we characterize the combinatorial metrics admitting a MacWilliams-type identity and describe the group of linear isometries of such metrics. Considering coverings that are not connected, we classify the metrics satisfying the MacWilliams extension property.
△ Less
Submitted 23 March, 2017;
originally announced March 2017.
-
Metrics Based on Finite Directed Graphs and Coding Invariants
Authors:
Tuvi Etzion,
Marcelo Firer,
Roberto Assis Machado
Abstract:
Given a finite directed graph with $n$ vertices, we define a metric $d_G$ on $\mathbb{F}_q^n$, where $\mathbb{F}_q$ is the finite field with $q$ elements. The weight of a word is defined as the number of vertices that can be reached by a directed path starting at the support of the vector. Two canonical forms, which do not affect the metric, are given to each graph. Based on these forms we charact…
▽ More
Given a finite directed graph with $n$ vertices, we define a metric $d_G$ on $\mathbb{F}_q^n$, where $\mathbb{F}_q$ is the finite field with $q$ elements. The weight of a word is defined as the number of vertices that can be reached by a directed path starting at the support of the vector. Two canonical forms, which do not affect the metric, are given to each graph. Based on these forms we characterize each such metric. We further use these forms to prove that two graphs with different canonical forms yield different metrics. Efficient algorithms to check if a set of metric weights define a metric based on a graph are given. We provide tight bounds on the number of metric weights required to reconstruct the metric. Furthermore, we give a complete description of the group of linear isometries of the graph metrics and a characterization of the graphs for which every linear code admits a $G$-canonical decomposition. Considering those graphs, we are able to derive an expression of the packing radius of linear codes in such metric spaces. Finally, given a directed graph which determines a hierarchical poset, we present sufficient and necessary conditions to ensure the validity of the MacWilliams Identity and the MacWilliams Extension Property.
△ Less
Submitted 1 May, 2017; v1 submitted 26 September, 2016;
originally announced September 2016.
-
Characterization of metrics induced by hierarchical posets
Authors:
Roberto Assis Machado,
Jerry Anderson Pinheiro,
Marcelo Firer
Abstract:
In this paper we consider metrics determined by hierarchical posets and give explicit formulae for the main parameters of a linear code: the minimum distance and the packing, covering and Chebyshev radii of a code. We also present ten characterizations of hierarchical poset metrics, including new characterizations and simple new proofs to the known ones.
In this paper we consider metrics determined by hierarchical posets and give explicit formulae for the main parameters of a linear code: the minimum distance and the packing, covering and Chebyshev radii of a code. We also present ten characterizations of hierarchical poset metrics, including new characterizations and simple new proofs to the known ones.
△ Less
Submitted 23 March, 2017; v1 submitted 4 August, 2015;
originally announced August 2015.