Click here to flash read.
arXiv:2404.16431v1 Announce Type: new
Abstract: In this paper, we consider two critical aspects of security in the \textit{distributed computing (DC)} model: \textit{secure data shuffling} and \textit{secure coded computing}. It is imperative that any external entity overhearing the transmissions does not gain any information about the \textit{intermediate values (IVs)} exchanged during the shuffling phase of the DC model. Our approach ensures IV confidentiality during data shuffling. Moreover, each node in the system must be able to recover the IVs necessary for computing its output functions but must also remain oblivious to the IVs associated with output functions not assigned to it. We design secure DC methods and establish achievable limits on the tradeoffs between the communication and computation loads to contribute to the advancement of secure data processing in distributed systems.
No creative common's license