We consider a scenario involving computations over a massive dataset stored distributedly across multiple workers, which is at the core of distributed learning algorithms. We propose Lagrange Coded Computing (LCC), a new framework to simultaneously provide (1) resiliency against stragglers that may prolong computations; (2) security against Byzantine (or malicious) workers that deliberately modify the computation for their benefit; and (3) (information-theoretic) privacy of the dataset amidst possible collusion of workers. LCC, which leverages the well-known Lagrange polynomial to create computation redundancy in a novel coded form across workers, can be applied to any computation scenario in which the function of interest is an arbitrary m...
We propose a privacy-preserving federated learning (FL) scheme that is resilient against straggling ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
We consider a fully decentralized scenario in which no central trusted entity exists and all clients...
We consider a scenario involving computations over a massive dataset stored distributedly across mul...
Lagrange Coded Computing (LCC) is a recently proposed technique for resilient, secure, and private ...
We consider the problem of secure and private multiparty computation (MPC), in which the goal is to ...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
Existing approaches to distributed matrix computations involve allocating coded combinations of subm...
Private computation is a generalization of private information retrieval, in which a user is able to...
Data and analytics capabilities have made a leap forward in recent years. The volume of available da...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
In many practical settings, a user needs to perform computations---for example, using machine learni...
Privacy and security have rapidly emerged as first order design constraints. Users now demand more p...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We propose a privacy-preserving federated learning (FL) scheme that is resilient against straggling ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
We consider a fully decentralized scenario in which no central trusted entity exists and all clients...
We consider a scenario involving computations over a massive dataset stored distributedly across mul...
Lagrange Coded Computing (LCC) is a recently proposed technique for resilient, secure, and private ...
We consider the problem of secure and private multiparty computation (MPC), in which the goal is to ...
We consider the problem of private distributed computation. Our main interest in this problem stems ...
Existing approaches to distributed matrix computations involve allocating coded combinations of subm...
Private computation is a generalization of private information retrieval, in which a user is able to...
Data and analytics capabilities have made a leap forward in recent years. The volume of available da...
Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protec...
In many practical settings, a user needs to perform computations---for example, using machine learni...
Privacy and security have rapidly emerged as first order design constraints. Users now demand more p...
© 2017 Kim Sasha RamchenA fundamental problem in large distributed systems is how to enable parties ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
We propose a privacy-preserving federated learning (FL) scheme that is resilient against straggling ...
Secure Multi-Party Computation is a domain of Cryptography that enables several participants to comp...
We consider a fully decentralized scenario in which no central trusted entity exists and all clients...