Abstract
Private computation is a generalization of private information retrieval, in which a user is able to compute a function on a distributed dataset without revealing the identity of that function to the servers. In this paper, it is shown that Lagrange encoding, a powerful technique for encoding Reed-Solomon codes, enables private computation in many cases of interest. In particular, we present a scheme that enables private computation of polynomials of any degree on Lagrange encoded data, while being robust to Byzantine and straggling servers, and to servers colluding to attempt to deduce the identities of the functions to be evaluated. Moreover, incorporating ideas from the well-known Shamir secret sharing scheme allows the data itself to be concealed from the servers as well. Our results extend private computation to high degree polynomials and to data-privacy, and reveal a tight connection between private computation and coded computation.
Original language | English |
---|---|
Article number | 8754796 |
Pages (from-to) | 553-563 |
Number of pages | 11 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 15 |
DOIs | |
State | Published - 1 Jan 2020 |
Externally published | Yes |
Keywords
- Private computation
- Reed-Solomon codes
- data privacy
- private information retrieval (PIR)
ASJC Scopus subject areas
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications