Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Oliver W. Gnilke"'
Publikováno v:
Entropy, Vol 25, Iss 2, p 266 (2023)
Large matrix multiplications commonly take place in large-scale machine-learning applications. Often, the sheer size of these matrices prevent carrying out the multiplication at a single server. Therefore, these operations are typically offloaded to
Externí odkaz:
https://doaj.org/article/4e52707afabe43559f1da1f0f8a97f26
Autor:
Alex Karrila, David Karpuk, Oliver W. Gnilke, Mohamed Taoufiq Damir, Laia Amorós, Camilla Hollanti
Publikováno v:
Damir, M T, Karrila, A, Amoros, L, Gnilke, O, Karpuk, D & Hollanti, C 2021, ' Well-Rounded Lattices : Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels ', IEEE Transactions on Information Theory, vol. 67, no. 6, 9354828, pp. 3645-3663 . https://doi.org/10.1109/TIT.2021.3059749
The design of lattice coset codes for wiretap channels is considered. Bounds on the eavesdropper's correct decoding probability and information leakage are first revisited. From these bounds, it is explicit that both the information leakage and error
Publikováno v:
Li, J, Makkonen, O, Hollanti, C & Gnilke, O W 2022, ' Efficient Recovery of a Shared Secret via Cooperation : Applications to SDMM and PIR ', IEEE Journal on Selected Areas in Communications, vol. 40, no. 3, pp. 871-884 . https://doi.org/10.1109/JSAC.2022.3142366
This work considers the problem of privately outsourcing the computation of a matrix product over a finite field $\mathbb{F}_q$ to $N$ helper servers. These servers are considered to be honest but curious, i.e., they behave according to the protocol
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::95f80e85927c51072d84fc02a60f39ef
http://arxiv.org/abs/2106.05785
http://arxiv.org/abs/2106.05785
Publikováno v:
Tajeddine, R, Gnilke, O W, Karpuk, D, Freij-Hollanti, R & Hollanti, C 2019, ' Private Information Retrieval from Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers ', IEEE Transactions on Information Theory, vol. 65, no. 6, 8598994, pp. 3898-3906 . https://doi.org/10.1109/TIT.2018.2890285
The problem of Private Information Retrieval (PIR) from coded storage systems with colluding, byzantine, and unresponsive servers is considered. An explicit scheme using an $[n,k]$ Reed-Solomon storage code is designed, protecting against $t$-collusi
Autor:
Ragnar Freij-Hollanti, Camilla Hollanti, David Karpuk, Oliver W. Gnilke, Ivo Kubjas, Anna-Lena Horlemann-Trautmann
Publikováno v:
IEEE Transactions on Information Theory. 65:2107-2118
Private information retrieval (PIR) schemes for coded storage with colluding servers are presented, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear codes are constructed, and the resulting PIR rate i
Publikováno v:
IEEE Transactions on Information Theory. 64:7081-7093
The problem of providing privacy, in the private information retrieval (PIR) sense, to users requesting data from a distributed storage system (DSS), is considered. The DSS is coded by an (n, k, d) Maximum Distance Separable (MDS) code to store the d
Publikováno v:
Etzion, T, Gnilke, O W, Karpuk, D, Yaakobi, E & Zhang, Y 2019, Private Proximity Retrieval . in 2019 IEEE International Symposium on Information Theory, ISIT 2019-Proceedings ., 8849249, IEEE Signal Processing Society, IEEE International Symposium on Information Theory-Proceedings, vol. 2019-July, pp. 2119-2123, 2019 IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, 07/07/2019 . https://doi.org/10.1109/ISIT.2019.8849249
ISIT
ISIT
A private proximity retrieval (PPR) scheme is a protocol which allows a user to retrieve the identities of all records in a database that are within some distance r from the user's record x. The user's privacy at each server is given by the fraction
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0c2ea6f1736c4b97fd4f7d7ef8525ec5
https://vbn.aau.dk/da/publications/1d393703-525b-483a-9f05-b48ce4b1ad5e
https://vbn.aau.dk/da/publications/1d393703-525b-483a-9f05-b48ce4b1ad5e
Autor:
Padraig Ó Catháin, Eric Swartz, Marcus Greferath, Oliver W. Gnilke, Guillermo Nuñez Ponasso, Camilla Hollanti
In a User-Private Information Retrieval (UPIR) scheme, a set of users collaborate to retrieve files from a database without revealing to observers which participant in the scheme requested the file. Protocols have been proposed based on pairwise bala
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::543619ef194f0ef0a61e01621e1bd7cd
https://aaltodoc.aalto.fi/handle/123456789/35937
https://aaltodoc.aalto.fi/handle/123456789/35937
Publikováno v:
ISIT
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and non-responsive servers is presented. Furthermore, the scheme can also be used for symmetric PIR in the same setting. An explicit scheme using an $[n,
Publikováno v:
SPAWC
Recently, various criteria for constructing wiretap lattice coset codes have been proposed, most prominently the minimization of the so-called flatness factor. However, these criteria are not constructive per se. As explicit constructions, well-round
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::643f31230e22346c8bf1a02e9c7d553b
http://juuli.fi/Record/0332322218
http://juuli.fi/Record/0332322218