We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The master wants to distribute these computations to untrusted workers who have volunteered or are incentivized to help with this task. However, the data must be kept private (in an information theoretic sense) and not revealed to the individual workers. The workers may be busy and will take a random time to finish the task assigned to them. We are interested in reducing the aggregate delay experienced by the master. We focus on linear computations as an essential operation in many iterative algorithms. A known solution is to use a linear ...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
This electronic version was submitted by the student author. The certified thesis is available in th...
We consider the setting of a master server who possesses confidential data (genomic, medical data, e...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
There has been a tremendous growth in the size of distributed systems in the past three decades. Tod...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Distributed storage, or shared data, is a vital mechanism for communication among processors in dist...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Lagrange Coded Computing (LCC) is a recently proposed technique for resilient, secure, and private c...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
This electronic version was submitted by the student author. The certified thesis is available in th...
We consider the setting of a master server who possesses confidential data (genomic, medical data, e...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
There has been a tremendous growth in the size of distributed systems in the past three decades. Tod...
Optimizing the maximum, or average, length of the shares in relation to the length of the secret for...
[[abstract]]A secret sharing scheme is a method which allows a secret to be shared among a finite se...
International audienceWe present a novel method for constructing linear secret sharing schemes (LSSS...
Distributed storage, or shared data, is a vital mechanism for communication among processors in dist...
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often...
Lagrange Coded Computing (LCC) is a recently proposed technique for resilient, secure, and private c...
Abstract. We present a novel method for constructing linear secret sharing schemes (LSSS) from linea...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allo...
Secure computation enables a set of mutually distrustful parties to collaboratively compute a public...
Abstract. Secure computation consists of protocols for secure arith-metic: secret values are added a...
This electronic version was submitted by the student author. The certified thesis is available in th...