entangled polynomial codes for secure private and batch
play

Entangled Polynomial Codes for Secure, Private, and Batch - PowerPoint PPT Presentation

Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier QIAN YU (USC) joint work with Salman Avestimehr (USC) IEEE International Symposium on Information Theory (ISIT)


  1. Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier QIAN YU (USC) joint work with Salman Avestimehr (USC) IEEE International Symposium on Information Theory (ISIT) July 2020

  2. Backgrounds: Challenges in Modern Distributed Computing Computational Scalability: • Node failure ( stragglers ) • Byzantine attack ( adversaries ) • Privacy breach ( colluding workers ) … colluding stragglers workers adversaries "The Tail at Scale" Google, 2013 Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  3. An Introduction to Coded Computing Problem Parameters • Input: X • Compute: g(X) N workers • N evaluations of f Coded Computing … f( ) f( ) f( ) Recovery Threshold: # workers ’ results needed for recovering final outputs (equivalent to straggler resiliency and Design Space computation security) • Encoding functions • Decoding functions Goal: minimize recovery threshold given N,g,f Yu et al, NIPS 2017 Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  4. An Introduction to Coded Computing Coded Computing Computation f - Channel Coded variables – Coded symbols vs Worker – Channel usage Recovery threshold – Communication rate (tolerate errors) Classical Shannon Theory Differences: • Algebraic vs probabilistic or combinatorial Key Challenge: how to design codes so that Require New coding ideas! 1. Computation on coded data is meaningful? • 2. Encoding and Decoding has low complexity Coding complexity Linear codes as a natural assumption Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  5. Solution: Polynomial Coded Computing (PCC) • Basic idea: • Design polynomials for input entries, s.t. the composition of f and polynomials recover the output. • Recovery threshold ≤ degree of composed polynomial + 1 Yu et al, NIPS 2017 • Example: Matrix Multiplication (Column-wise partition) • Input: X = (𝑩 , 𝑪) Compute: g(X)= 𝑩 𝑼 ⋅ 𝑪 • Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  6. Solution: Polynomial Coded Computing (PCC) • Basic idea: • Design polynomials for input entries, s.t. the composition of f and polynomials recover the output. • Recovery threshold ≤ degree of composed polynomial + 1 Yu et al, NIPS 2017 • Example: Matrix Multiplication (Column-wise partition) • Goal: recover all 𝒏𝒐 • Input: X = (𝑩 , 𝑪) pair-wise products Compute: g(X)= 𝑩 𝑼 ⋅ 𝑪 • T B j A i • N evaluations of f= ⋅ Requires 𝒏𝒐 workers 𝒏 submatrices 𝒐 submatrices Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  7. Solution: Polynomial Coded Computing (PCC) • Basic idea: • Design polynomials for input entries, s.t. the composition of f and polynomials recover the output. • Recovery threshold ≤ degree of composed polynomial + 1 Yu et al, NIPS 2017 • Example: Matrix Multiplication (Column-wise partition) • Goal: recover all 𝒏𝒐 • Design polynomials pair-wise products T B j A i Requires 𝒏𝒐 workers Encoding: worker i obtains 𝑏 𝑗 , 𝑐(𝑗) Worker i essentially calculates: First optimal code for Recovery threshold = 𝒏𝒐 non-linear operations! Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  8. Solution: Polynomial Coded Computing (PCC) Recovery threshold Recovery threshold Recovery threshold … First optimal code for non-linear operations! Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  9. Problem Formulation: Block Matrix Multiplication A better design for straggler mitigation Orderwise improvement for Secure, Private, (Entangled polynomial codes) Batch Matrix Multiplication Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr, “ Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding ” , Jan 2018, ISIT, TIT. Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  10. Problem Formulation: Block Matrix Multiplication A better design for straggler mitigation Orderwise improvement for Secure, Private, (Entangled polynomial codes) Batch Matrix Multiplication p × 𝑛 blocks p × 𝑜 blocks • Flexible tradeoff in computation, storage, communication ෩ 𝑼 ෩ 𝑩 𝒋 ⋅ 𝑪 𝒋 each worker 𝑗 computes • Also studied in Fahim et al, Allerton 2017 Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr , “ Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding ”, Jan 2018, ISIT, TIT. Qian Yu - Entangled Polynomial Codes (ISIT) July 2020 Qian Yu (USC)

  11. Block Matrix Multiplication (Straggler Mitigation) Best known result p × 𝑛 blocks Theorem (Yu et al, Jan 2018) Entangled polynomial codes achieves Recovery threshold ≤ p × 𝑜 blocks Cubic ver. Sub-cubic ver. Relate works All related works (Cubic interpretation, at least 𝒒𝒏𝒐 workers) • Polydot (Allerton 2017) 𝑛𝑜(2𝑞 − 1) for 𝑛 = 𝑜 • Generalized Polydot (arxiv ver. May 2018) Entangled Polynomial Codes: 𝑞𝑛𝑜 + 𝑞 − 1 Order-wise coding gain for any large p,m,n Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr , “ Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding ”, Jan 2018, ISIT, TIT. Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  12. Entangled Polynomial Codes - Breaking the “Cubic” Barrier Tensor decomposition since ~1960s Relate works • Cubic interpretation 𝑆(𝑞, 𝑛, 𝑜) = # multiplications needed for multiplying an 𝑛 -by- 𝑞 • matrix by a 𝑞 -by- 𝑜 matrix. recover linear combinations • of 𝒒𝒏𝒐 pair-wise products Bilinear complexity is sub-cubic: 𝑆 𝑞, 𝑛, 𝑜 = 𝑝 𝑞𝑛𝑜 for any T B ik ෍ A ij large p,m,n • 𝒋 Lazy proof (special case), 𝑆 2,2,2 = 7, 𝑆 2 𝑦 , 2 𝑦 , 2 𝑦 ≤ 7 𝑦 All requiring at least 𝒒𝒏𝒐 Theorem: does not guarantee straggler resiliency What is missing?: Design codes for subcubic interpretation! Theorem (Yu et al, Jan 2018) Entangled polynomial codes achieves Recovery threshold ≤ What if 𝑆 𝑞, 𝑛, 𝑜 not yet known? Sub-cubic upper bound exists for any large p,m,n Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr, “ Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding ” , Jan 2018, ISIT, TIT. Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  13. Entangled Polynomial Codes - Breaking the “ Cubic ” Barrier Design codes for subcubic interpretation! Theorem (Yu et al, Jan 2018) Entangled polynomial codes achieves Recovery threshold ≤ Sub-cubic ver. Cubic ver. different coding structures • Not by just plugging in fast matrix multiplication Qian Yu, Mohammad Ali Maddah-Ali, Salman Avestimehr , “ Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding ”, Jan 2018, ISIT, TIT. Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  14. Entangled Polynomial Codes - Breaking the “Cubic” Barrier Theorem (Entangled Polynomial Codes) All related works (Cubic interpretation, at least 𝒒𝒏𝒐 workers) Entangled Polynomial Codes: Order-wise coding gain for any large p,m,n Unified framework with order-wise improvement Private Matrix Multiplication Fault-Tolerant Computing Coded Computing Entangled Polynomial Batch Matrix Matrix Multiplication Codes Multiplication Secure Matrix Algorithms Multiplication Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  15. Secure, Private, Batch Matrix Multiplication Private Distributed Matrix Multiplication Secure Distributed Matrix Multiplication …and all possible mixtures One/Two-sided secure: Private: One/Two of inputs information theoretically private against 𝑈 colluding workers Query D information theoretically private against any worker Batch Distributed Matrix Multiplication Element-wise multiply two lists of matrices (Length: L) Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  16. Entangled Polynomial Codes - Breaking the “Cubic” Barrier Secure, Private, Batch Matrix Multiplication all possible mixtures Theorem Relate works Entangled polynomial codes achieves • Secure Private Recovery threshold ≤ Θ(𝑆(𝑞, 𝑛, 𝑜)) for all setting Nodehi et al, 2018 • Aliasgari et al, 2019 • Jia and Jafar, 2019 Requiring 𝐩(𝒒𝒏𝒐) workers for all settings … Batch Remark 1 (Polynomial Coded Computing) All built upon cubic interpretation Straggler resiliency comes for free require at least 𝒒𝒏𝒐 workers Remark 2 (Converse) Optimal within a factor of 2 Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

  17. Entangled Polynomial Codes - Breaking the “Cubic” Barrier Secure, Private, Batch Matrix Multiplication Example 1: Secure Distributed Matrix Multiplication Secure Distributed Matrix Multiplication Theorem (Secure Distributed Matrix Multiplication) Entangled polynomial codes achieves +𝑈 for one-sided security recovery threshold ≤ 2𝑆 𝑞, 𝑛, 𝑜 − 1 +2𝑈 for two-sided security One/Two-sided secure: One/Two of inputs information theoretically private against 𝑈 colluding workers State of the arts Require at least 𝒒𝒏𝒐 +𝑼 workers for one-sided security +𝟑𝑼 workers for one-sided security Qian Yu - Entangled Polynomial Codes (ISIT) July 2020

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend