12 research outputs found

    Verifiable Coded Computation of Multiple Functions

    Full text link
    We consider the problem of evaluating distinct multivariate polynomials over several massive datasets in a distributed computing system with a single master node and multiple worker nodes. We focus on the general case when each multivariate polynomial is evaluated over its corresponding dataset and propose a generalization of the Lagrange Coded Computing framework (Yu et al. 2019) to perform all computations simultaneously while providing robustness against stragglers who do not respond in time, adversarial workers who respond with wrong computation and information-theoretic security of dataset against colluding workers. Our scheme introduces a small computation overhead which results in a reduction in download cost and also offers comparable resistance to stragglers over existing solutions. On top of it, we also propose two verification schemes to detect the presence of adversaries, which leads to incorrect results, without involving additional nodes.Comment: 13 pages, 1 figure, 2 table

    Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols

    Full text link
    Motivated by applications in distributed storage, distributed computing, and homomorphic secret sharing, we study communication-efficient schemes for computing linear combinations of coded symbols. Specifically, we design low-bandwidth schemes that evaluate the weighted sum of β„“\ell coded symbols in a codeword c∈Fn\pmb{c}\in\mathbb{F}^n, when we are given access to dd of the remaining components in c\pmb{c}. Formally, suppose that F\mathbb{F} is a field extension of B\mathbb{B} of degree tt. Let c\pmb{c} be a codeword in a Reed-Solomon code of dimension kk and our task is to compute the weighted sum of β„“\ell coded symbols. In this paper, for some s<ts<t, we provide an explicit scheme that performs this task by downloading d(tβˆ’s)d(t-s) sub-symbols in B\mathbb{B} from dd available nodes, whenever dβ‰₯β„“βˆ£B∣sβˆ’β„“+kd\geq \ell|\mathbb{B}|^s-\ell+k. In many cases, our scheme outperforms previous schemes in the literature. Furthermore, we provide a characterization of evaluation schemes for general linear codes. Then in the special case of Reed-Solomon codes, we use this characterization to derive a lower bound for the evaluation bandwidth.Comment: 23 pages, 2 figure

    Committed Private Information Retrieval

    Full text link
    A private information retrieval (PIR) scheme allows a client to retrieve a data item xix_i among nn items x1,x2,…,xnx_1,x_2,\ldots,x_n from kk servers, without revealing what ii is even when t<kt < k servers collude and try to learn ii. Such a PIR scheme is said to be tt-private. A PIR scheme is vv-verifiable if the client can verify the correctness of the retrieved xix_i even when v≀kv \leq k servers collude and try to fool the client by sending manipulated data. Most of the previous works in the literature on PIR assumed that v<kv < k, leaving the case of all-colluding servers open. We propose a generic construction that combines a linear map commitment (LMC) and an arbitrary linear PIR scheme to produce a kk-verifiable PIR scheme, termed a committed PIR scheme. Such a scheme guarantees that even in the worst scenario, when all servers are under the control of an attacker, although the privacy is unavoidably lost, the client won't be fooled into accepting an incorrect xix_i. We demonstrate the practicality of our proposal by implementing the committed PIR schemes based on the Lai-Malavolta LMC and three well-known PIR schemes using the GMP library and blst, the current fastest C library for elliptic curve pairings.Comment: Accepted at ESORICS 202

    New Bounds and Generalizations of Locally Recoverable Codes With Availability

    No full text

    Coded computation of multiple functions

    No full text
    We consider the problem of evaluating arbitrary multivariate polynomials over several massive datasets in a distributed computing system with a single master node and multiple worker nodes. We focus on the general case when each multivariate polynomial is evaluated over its dataset and propose a generalization of the Lagrange Coded Computing framework (Yu et al. 2019) to provide robustness against stragglers who do not respond in time, adversarial workers who respond with wrong computation and information-theoretic security of dataset against colluding workers. Our scheme introduces a small computation overhead which results in a reduction in download cost and also offers comparable resistance to stragglers over existing solutions.Ministry of Education (MOE)National Research Foundation (NRF)Submitted/Accepted versionThis research / project is supported by the National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative, and Singapore Ministry of Education Academic Research Fund Tier 2 Grants MOE2019-T2-2- 083 and MOE-T2EP20121-0007

    Information-theoretic problems of DNA-based storage systems

    No full text
    International audienceCurrently, we witness an explosive growth in the amount of information produced by humanity. This raises new fundamental problems of its efficient storage and processing. Commonly used magnetic, optical, and semiconductor information storage devices have several drawbacks related to small information density and limited durability. One of the promising novel approaches to solving these problems is DNA-based data storage. Purpose: An overview of modern DNA-based storage systems and related information-theoretic problems. Results: The current state of the art of DNA-based storage systems is reviewed. Types of errors occurring in them as well as corresponding error-correcting codes are analysed. The disadvantages of these codes are shown, and possible pathways for improvement are mentioned. Proposed information-theoretic models of DNA-based storage systems are analysed, and their limitation highlighted. In conclusion, main obstacles to practical implementation of DNA-based storage systems are formulated, which can be potentially overcome using information-theoretic methods considered in this overview.Π’Π²Π΅Π΄Π΅Π½ΠΈΠ΅: Π²Π·Ρ€Ρ‹Π²Π½ΠΎΠΉ рост объСмов ΠΏΡ€ΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΠΌΠΎΠΉ чСловСчСством ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ставит Π½ΠΎΠ²Ρ‹Π΅ Ρ„ΡƒΠ½Π΄Π°ΠΌΠ΅Π½Ρ‚Π°Π»ΡŒΠ½Ρ‹Π΅ Π·Π°Π΄Π°Ρ‡ΠΈ, связанныС с Π΅Π΅ эффСктивным Ρ…Ρ€Π°Π½Π΅Π½ΠΈΠ΅ΠΌ ΠΈ доступом ΠΊ Π½Π΅ΠΉ. Π¨ΠΈΡ€ΠΎΠΊΠΎ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Π΅ ΠΏΡ€ΠΈ этом ΠΌΠ°Π³Π½ΠΈΡ‚Π½Ρ‹Π΅, оптичСскиС ΠΈ ΠΏΠΎΠ»ΡƒΠΏΡ€ΠΎΠ²ΠΎΠ΄Π½ΠΈΠΊΠΎΠ²Ρ‹Π΅ устройства хранСния ΠΈΠΌΠ΅ΡŽΡ‚ ряд сущСствСнных нСдостатков, связанных, ΠΏΡ€Π΅ΠΆΠ΄Π΅ всСго, с ограничСниями Π½Π° объСм ΠΈ Π΄ΠΎΠ»Π³ΠΎΠ²Π΅Ρ‡Π½ΠΎΡΡ‚ΡŒ хранСния. Одной ΠΈΠ· Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Ρ… Π°Π»ΡŒΡ‚Π΅Ρ€Π½Π°Ρ‚ΠΈΠ², Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎ исслСдуСмой Π² послСдниС Π³ΠΎΠ΄Ρ‹, являСтся Ρ…Ρ€Π°Π½Π΅Π½ΠΈΠ΅ Π΄Π°Π½Π½Ρ‹Ρ… с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΠΌΠΎΠ»Π΅ΠΊΡƒΠ» Π”ΠΠš. ЦСль: ΠΎΠ±Π·ΠΎΡ€ Ρ‚Π΅ΠΊΡƒΡ‰Π΅Π³ΠΎ состояния ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² хранСния ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΠΌΠΎΠ»Π΅ΠΊΡƒΠ» Π”ΠΠš ΠΈ связанных Ρ‚Π΅ΠΎΡ€Π΅Ρ‚ΠΈΠΊΠΎ-ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ. Π Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Ρ‹: сдСлан ΠΎΠ±Π·ΠΎΡ€ соврСмСнного состояния Π΄Π΅Π» Π² Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠ΅ систСм Π”ΠΠš-памяти. ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· Ρ‚ΠΈΠΏΠΎΠ² ошибок, Π²ΠΎΠ·Π½ΠΈΠΊΠ°ΡŽΡ‰ΠΈΡ… Π² Ρ‚Π°ΠΊΠΈΡ… систСмах, ΠΈ ΠΊΠΎΡ€Ρ€Π΅ΠΊΡ‚ΠΈΡ€ΡƒΡŽΡ‰ΠΈΡ… ΠΊΠΎΠ΄ΠΎΠ² для выявлСния ΠΈ исправлСния этих ошибок. ΠŸΠΎΠΊΠ°Π·Π°Π½Ρ‹ нСдостатки ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π½Ρ‹Ρ… Π½Π° сСгодня ΠΊΠΎΠ΄ΠΎΠ² ΠΈ ΡƒΠΊΠ°Π·Π°Π½Ρ‹ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½Ρ‹Π΅ направлСния ΠΈΡ… ΡƒΠ»ΡƒΡ‡ΡˆΠ΅Π½ΠΈΡ. ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΡƒΡ‰Π΅ΡΡ‚Π²ΡƒΡŽΡ‰ΠΈΡ… Ρ‚Π΅ΠΎΡ€Π΅Ρ‚ΠΈΠΊΠΎ-ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ°Π½Π°Π»ΠΎΠ² для систСм Π”ΠΠš-памяти ΠΈ присущих ΠΈΠΌ ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π΅Π½ΠΈΠΉ. Π’ Π·Π°ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠΈ ΠΎΠ±Π·ΠΎΡ€Π° сформулированы основныС ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹ Π½Π° ΠΏΡƒΡ‚ΠΈ создания практичСских систСм Π”ΠΠš-памяти, Ρ€Π΅ΡˆΠ΅Π½ΠΈΡŽ ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… послуТит дальнСйшСС Ρ€Π°Π·Π²ΠΈΡ‚ΠΈΠ΅ Ρ‚Π΅ΠΎΡ€Π΅Ρ‚ΠΈΠΊΠΎ-ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ², рассмотрСнных Π² настоящСм ΠΎΠ±Π·ΠΎΡ€Π΅. ΠšΠ»ΡŽΡ‡Π΅Π²Ρ‹Π΅ слова-систСмы хранСния ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ, Π”ΠΠš-ΠΏΠ°ΠΌΡΡ‚ΡŒ, ΠΊΠ°Π½Π°Π»Ρ‹ ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ, пропускная ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΊΠ°Π½Π°Π»Π°, ошибки Π·Π°ΠΌΠ΅Π½Ρ‹, ошибки вставки, ошибки выпадСния

    Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

    Full text link
    Private Information Retrieval (PIR) schemes allow a client to retrieve any file of interest, while hiding the file identity from the database servers. In contrast to most existing PIR schemes that assume honest-but-curious servers, we study the case of dishonest servers. The latter provide incorrect answers and try to persuade the client to output the wrong result. We introduce several PIR schemes with information-theoretic privacy and result verification for the case of two servers. Security guarantees can be information-theoretical or computational, and the verification keys can be public or private. In this work, our main performance metric is the download rate.Comment: Accepted to IEEE International Symposium on Information Theory 202
    corecore