12 research outputs found
Verifiable Coded Computation of Multiple Functions
We consider the problem of evaluating distinct multivariate polynomials over
several massive datasets in a distributed computing system with a single master
node and multiple worker nodes. We focus on the general case when each
multivariate polynomial is evaluated over its corresponding dataset and propose
a generalization of the Lagrange Coded Computing framework (Yu et al. 2019) to
perform all computations simultaneously while providing robustness against
stragglers who do not respond in time, adversarial workers who respond with
wrong computation and information-theoretic security of dataset against
colluding workers. Our scheme introduces a small computation overhead which
results in a reduction in download cost and also offers comparable resistance
to stragglers over existing solutions. On top of it, we also propose two
verification schemes to detect the presence of adversaries, which leads to
incorrect results, without involving additional nodes.Comment: 13 pages, 1 figure, 2 table
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols
Motivated by applications in distributed storage, distributed computing, and
homomorphic secret sharing, we study communication-efficient schemes for
computing linear combinations of coded symbols. Specifically, we design
low-bandwidth schemes that evaluate the weighted sum of coded symbols in
a codeword , when we are given access to of the
remaining components in .
Formally, suppose that is a field extension of of
degree . Let be a codeword in a Reed-Solomon code of dimension
and our task is to compute the weighted sum of coded symbols. In this
paper, for some , we provide an explicit scheme that performs this task by
downloading sub-symbols in from available nodes,
whenever . In many cases, our scheme
outperforms previous schemes in the literature.
Furthermore, we provide a characterization of evaluation schemes for general
linear codes. Then in the special case of Reed-Solomon codes, we use this
characterization to derive a lower bound for the evaluation bandwidth.Comment: 23 pages, 2 figure
Committed Private Information Retrieval
A private information retrieval (PIR) scheme allows a client to retrieve a
data item among items from servers, without
revealing what is even when servers collude and try to learn .
Such a PIR scheme is said to be -private. A PIR scheme is -verifiable if
the client can verify the correctness of the retrieved even when servers collude and try to fool the client by sending manipulated data. Most
of the previous works in the literature on PIR assumed that , leaving
the case of all-colluding servers open. We propose a generic construction that
combines a linear map commitment (LMC) and an arbitrary linear PIR scheme to
produce a -verifiable PIR scheme, termed a committed PIR scheme. Such a
scheme guarantees that even in the worst scenario, when all servers are under
the control of an attacker, although the privacy is unavoidably lost, the
client won't be fooled into accepting an incorrect . We demonstrate the
practicality of our proposal by implementing the committed PIR schemes based on
the Lai-Malavolta LMC and three well-known PIR schemes using the GMP library
and blst, the current fastest C library for elliptic curve pairings.Comment: Accepted at ESORICS 202
Coded computation of multiple functions
We consider the problem of evaluating arbitrary multivariate polynomials over
several massive datasets in a distributed computing system with a single master
node and multiple worker nodes. We focus on the general case when each
multivariate polynomial is evaluated over its dataset and propose a
generalization of the Lagrange Coded Computing framework (Yu et al. 2019) to
provide robustness against stragglers who do not respond in time, adversarial
workers who respond with wrong computation and information-theoretic security
of dataset against colluding workers. Our scheme introduces a small computation
overhead which results in a reduction in download cost and also offers
comparable resistance to stragglers over existing solutions.Ministry of Education (MOE)National Research Foundation (NRF)Submitted/Accepted versionThis research / project is supported by the National Research Foundation, Singapore under its Strategic Capability Research Centres Funding Initiative, and Singapore Ministry of Education Academic Research Fund Tier 2 Grants MOE2019-T2-2- 083 and MOE-T2EP20121-0007
Information-theoretic problems of DNA-based storage systems
International audienceCurrently, we witness an explosive growth in the amount of information produced by humanity. This raises new fundamental problems of its efficient storage and processing. Commonly used magnetic, optical, and semiconductor information storage devices have several drawbacks related to small information density and limited durability. One of the promising novel approaches to solving these problems is DNA-based data storage. Purpose: An overview of modern DNA-based storage systems and related information-theoretic problems. Results: The current state of the art of DNA-based storage systems is reviewed. Types of errors occurring in them as well as corresponding error-correcting codes are analysed. The disadvantages of these codes are shown, and possible pathways for improvement are mentioned. Proposed information-theoretic models of DNA-based storage systems are analysed, and their limitation highlighted. In conclusion, main obstacles to practical implementation of DNA-based storage systems are formulated, which can be potentially overcome using information-theoretic methods considered in this overview.ΠΠ²Π΅Π΄Π΅Π½ΠΈΠ΅: Π²Π·ΡΡΠ²Π½ΠΎΠΉ ΡΠΎΡΡ ΠΎΠ±ΡΠ΅ΠΌΠΎΠ² ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΠΌΠΎΠΉ ΡΠ΅Π»ΠΎΠ²Π΅ΡΠ΅ΡΡΠ²ΠΎΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΡΡΠ°Π²ΠΈΡ Π½ΠΎΠ²ΡΠ΅ ΡΡΠ½Π΄Π°ΠΌΠ΅Π½ΡΠ°Π»ΡΠ½ΡΠ΅ Π·Π°Π΄Π°ΡΠΈ, ΡΠ²ΡΠ·Π°Π½Π½ΡΠ΅ Ρ Π΅Π΅ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΡΠΌ Ρ
ΡΠ°Π½Π΅Π½ΠΈΠ΅ΠΌ ΠΈ Π΄ΠΎΡΡΡΠΏΠΎΠΌ ΠΊ Π½Π΅ΠΉ. Π¨ΠΈΡΠΎΠΊΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΠ΅ ΠΏΡΠΈ ΡΡΠΎΠΌ ΠΌΠ°Π³Π½ΠΈΡΠ½ΡΠ΅, ΠΎΠΏΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΠΈ ΠΏΠΎΠ»ΡΠΏΡΠΎΠ²ΠΎΠ΄Π½ΠΈΠΊΠΎΠ²ΡΠ΅ ΡΡΡΡΠΎΠΉΡΡΠ²Π° Ρ
ΡΠ°Π½Π΅Π½ΠΈΡ ΠΈΠΌΠ΅ΡΡ ΡΡΠ΄ ΡΡΡΠ΅ΡΡΠ²Π΅Π½Π½ΡΡ
Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΎΠ², ΡΠ²ΡΠ·Π°Π½Π½ΡΡ
, ΠΏΡΠ΅ΠΆΠ΄Π΅ Π²ΡΠ΅Π³ΠΎ, Ρ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΡΠΌΠΈ Π½Π° ΠΎΠ±ΡΠ΅ΠΌ ΠΈ Π΄ΠΎΠ»Π³ΠΎΠ²Π΅ΡΠ½ΠΎΡΡΡ Ρ
ΡΠ°Π½Π΅Π½ΠΈΡ. ΠΠ΄Π½ΠΎΠΉ ΠΈΠ· Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
Π°Π»ΡΡΠ΅ΡΠ½Π°ΡΠΈΠ², Π°ΠΊΡΠΈΠ²Π½ΠΎ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΠΌΠΎΠΉ Π² ΠΏΠΎΡΠ»Π΅Π΄Π½ΠΈΠ΅ Π³ΠΎΠ΄Ρ, ΡΠ²Π»ΡΠ΅ΡΡΡ Ρ
ΡΠ°Π½Π΅Π½ΠΈΠ΅ Π΄Π°Π½Π½ΡΡ
Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΌΠΎΠ»Π΅ΠΊΡΠ» ΠΠΠ. Π¦Π΅Π»Ρ: ΠΎΠ±Π·ΠΎΡ ΡΠ΅ΠΊΡΡΠ΅Π³ΠΎ ΡΠΎΡΡΠΎΡΠ½ΠΈΡ ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² Ρ
ΡΠ°Π½Π΅Π½ΠΈΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ Ρ ΠΏΠΎΠΌΠΎΡΡΡ ΠΌΠΎΠ»Π΅ΠΊΡΠ» ΠΠΠ ΠΈ ΡΠ²ΡΠ·Π°Π½Π½ΡΡ
ΡΠ΅ΠΎΡΠ΅ΡΠΈΠΊΠΎ-ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΠΏΡΠΎΠ±Π»Π΅ΠΌ. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ: ΡΠ΄Π΅Π»Π°Π½ ΠΎΠ±Π·ΠΎΡ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΠΎΠ³ΠΎ ΡΠΎΡΡΠΎΡΠ½ΠΈΡ Π΄Π΅Π» Π² ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠ΅ ΡΠΈΡΡΠ΅ΠΌ ΠΠΠ-ΠΏΠ°ΠΌΡΡΠΈ. ΠΡΠΎΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΠΈΠΏΠΎΠ² ΠΎΡΠΈΠ±ΠΎΠΊ, Π²ΠΎΠ·Π½ΠΈΠΊΠ°ΡΡΠΈΡ
Π² ΡΠ°ΠΊΠΈΡ
ΡΠΈΡΡΠ΅ΠΌΠ°Ρ
, ΠΈ ΠΊΠΎΡΡΠ΅ΠΊΡΠΈΡΡΡΡΠΈΡ
ΠΊΠΎΠ΄ΠΎΠ² Π΄Π»Ρ Π²ΡΡΠ²Π»Π΅Π½ΠΈΡ ΠΈ ΠΈΡΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΡΡΠΈΡ
ΠΎΡΠΈΠ±ΠΎΠΊ. ΠΠΎΠΊΠ°Π·Π°Π½Ρ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΊΠΈ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΡΡ
Π½Π° ΡΠ΅Π³ΠΎΠ΄Π½Ρ ΠΊΠΎΠ΄ΠΎΠ² ΠΈ ΡΠΊΠ°Π·Π°Π½Ρ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΠ΅ Π½Π°ΠΏΡΠ°Π²Π»Π΅Π½ΠΈΡ ΠΈΡ
ΡΠ»ΡΡΡΠ΅Π½ΠΈΡ. ΠΡΠΈΠ²Π΅Π΄Π΅Π½ Π°Π½Π°Π»ΠΈΠ· ΡΡΡΠ΅ΡΡΠ²ΡΡΡΠΈΡ
ΡΠ΅ΠΎΡΠ΅ΡΠΈΠΊΠΎ-ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΠΌΠΎΠ΄Π΅Π»Π΅ΠΉ ΠΊΠ°Π½Π°Π»ΠΎΠ² Π΄Π»Ρ ΡΠΈΡΡΠ΅ΠΌ ΠΠΠ-ΠΏΠ°ΠΌΡΡΠΈ ΠΈ ΠΏΡΠΈΡΡΡΠΈΡ
ΠΈΠΌ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΠΉ. Π Π·Π°ΠΊΠ»ΡΡΠ΅Π½ΠΈΠΈ ΠΎΠ±Π·ΠΎΡΠ° ΡΡΠΎΡΠΌΡΠ»ΠΈΡΠΎΠ²Π°Π½Ρ ΠΎΡΠ½ΠΎΠ²Π½ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌΡ Π½Π° ΠΏΡΡΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΡ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΠΠ-ΠΏΠ°ΠΌΡΡΠΈ, ΡΠ΅ΡΠ΅Π½ΠΈΡ ΠΊΠΎΡΠΎΡΡΡ
ΠΏΠΎΡΠ»ΡΠΆΠΈΡ Π΄Π°Π»ΡΠ½Π΅ΠΉΡΠ΅Π΅ ΡΠ°Π·Π²ΠΈΡΠΈΠ΅ ΡΠ΅ΠΎΡΠ΅ΡΠΈΠΊΠΎ-ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ
ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ², ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½Π½ΡΡ
Π² Π½Π°ΡΡΠΎΡΡΠ΅ΠΌ ΠΎΠ±Π·ΠΎΡΠ΅. ΠΠ»ΡΡΠ΅Π²ΡΠ΅ ΡΠ»ΠΎΠ²Π°-ΡΠΈΡΡΠ΅ΠΌΡ Ρ
ΡΠ°Π½Π΅Π½ΠΈΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ, ΠΠΠ-ΠΏΠ°ΠΌΡΡΡ, ΠΊΠ°Π½Π°Π»Ρ ΠΏΠ΅ΡΠ΅Π΄Π°ΡΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ, ΠΏΡΠΎΠΏΡΡΠΊΠ½Π°Ρ ΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡΡ ΠΊΠ°Π½Π°Π»Π°, ΠΎΡΠΈΠ±ΠΊΠΈ Π·Π°ΠΌΠ΅Π½Ρ, ΠΎΡΠΈΠ±ΠΊΠΈ Π²ΡΡΠ°Π²ΠΊΠΈ, ΠΎΡΠΈΠ±ΠΊΠΈ Π²ΡΠΏΠ°Π΄Π΅Π½ΠΈΡ
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification
Private Information Retrieval (PIR) schemes allow a client to retrieve any
file of interest, while hiding the file identity from the database servers. In
contrast to most existing PIR schemes that assume honest-but-curious servers,
we study the case of dishonest servers. The latter provide incorrect answers
and try to persuade the client to output the wrong result. We introduce several
PIR schemes with information-theoretic privacy and result verification for the
case of two servers. Security guarantees can be information-theoretical or
computational, and the verification keys can be public or private. In this
work, our main performance metric is the download rate.Comment: Accepted to IEEE International Symposium on Information Theory 202