Adaptive Gap Entangled Polynomial Coding for Multi-Party Computation at the Edge

03/13/2022
by   Elahe Vedadi, et al.
0

Multi-party computation (MPC) is promising for designing privacy-preserving machine learning algorithms at edge networks. An emerging approach is coded-MPC (CMPC), which advocates the use of coded computation to improve the performance of MPC in terms of the required number of workers involved in computations. The current approach for designing CMPC algorithms is to merely combine efficient coded computation constructions with MPC. Instead, we propose a new construction; Adaptive Gap Entangled polynomial (AGE) codes, where the degrees of polynomials used in computations are optimized for MPC. We show that MPC with AGE codes (AGE-CMPC) performs better than existing CMPC algorithms in terms of the required number of workers as well as storage, communication and computation load.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/11/2023

Efficient Coded Multi-Party Computation at Edge Networks

Multi-party computation (MPC) is promising for designing privacy-preserv...
research
06/15/2021

Coded Privacy-Preserving Computation at Edge Networks

Multi-party computation (MPC) is promising for privacy-preserving machin...
research
06/04/2018

Learning a Code: Machine Learning for Approximate Non-Linear Coded Computation

Machine learning algorithms are typically run on large scale, distribute...
research
08/12/2019

Secure Coded Multi-Party Computation for Massive Matrix Operations

In this paper, we consider a secure multi-party computation problem (MPC...
research
04/02/2021

PolyDNN: Polynomial Representation of NN for Communication-less SMPC Inference

The structure and weights of Deep Neural Networks (DNN) typically encode...
research
07/09/2021

Publicly Auditable MPC-as-a-Service with succinct verification and universal setup

In recent years, multiparty computation as a service (MPCaaS) has gained...
research
09/15/2021

MPC-Friendly Commitments for Publicly Verifiable Covert Security

We address the problem of efficiently verifying a commitment in a two-pa...

Please sign up or login with your details

Forgot password? Click here to reset