Quantum Private Distributed Matrix Multiplication With Degree Tables
By: Mohamed Nomeir , Alptug Aytekin , Lei Hu and more
Potential Business Impact:
Makes private math calculations faster using quantum tricks.
In this paper, we explore how quantum resources can be used to increase the rate of private distributed matrix multiplication (PDMM). In PDMM, a user who has two high-dimensional matrices, $A$ and $B$, and lacks the computational capabilities to apply matrix multiplication locally, divides the matrices $A$ and $B$ into $K$ and $L$ sub-blocks, respectively. Then, the user sends them to $N$ servers to apply the required multiplication privately from any $T$ servers. The goal is to reduce the number of servers needed to perform the required matrix multiplication. In the quantum setting, we allow the servers to share an entangled state and respond over quantum channels. Upon receiving the qudits, the user applies measurements to obtain the required multiplication. There are two main regimes in the PDMM literature: The high-privacy regime and the low-privacy regime where $T$ is less than $K$ and $L$. First, in the high-privacy regime, the state-of-the-art classical code is called the gap additive secure polynomial (GASP) code. We define a feasibility requirement in the quantum setting for the GASP code such that the highest performance is achieved when it is satisfied. When it is not satisfied, we address two main concerns. The first is to find a relation between the minimum privacy requirement and the dimensions of the two matrices needed for the feasibility condition to be satisfied. Second, we develop a new family of codes that can work in the quantum setting. Second, since GASP does not work efficiently in the low-privacy regimes compared to cyclic-addition degree tables (CAT) and discretely optimized GASP (DOG), we show that the feasibility condition developed for GASP can be adopted for both CAT and DOG codes as well. In addition, we propose another set of codes that can be used in the low privacy regime in the quantum setting when the feasibility requirement is not satisfied.
Similar Papers
Analog Secure Distributed Matrix Multiplication
Information Theory
Keeps secret math calculations safe from spies.
Distributed Batch Matrix Multiplication: Trade-Offs in Download Rate, Randomness, and Privacy
Information Theory
Keeps secret data safe during computer calculations.
Decryption thorough polynomial ambiguity: noise-enhanced high-memory convolutional codes for post-quantum cryptography
Cryptography and Security
Secures messages from future quantum computers.