Okko Makkonen

Okko Makkonen
Aalto University · Department of Mathematics and Systems Analysis

Master of Science

About

7
Publications
125
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12
Citations
Citations since 2017
7 Research Items
12 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468

Publications

Publications (7)
Preprint
In this paper, we propose a novel construction for secure distributed matrix multiplication (SDMM) based on algebraic geometry (AG) codes. The proposed construction is inspired by the GASP code, where so-called gaps in a certain polynomial are utilized to achieve higher communication rates. Our construction considers the gaps in a Weierstrass semig...
Preprint
Full-text available
The Gram matrix of a matrix $A$ is defined as $AA^T$ (or $A^TA$). Computing the Gram matrix is an important operation in many applications, such as linear regression with the least squares method, where the explicit solution formula includes the Gram matrix of the data matrix. Secure distributed matrix multiplication (SDMM) can be used to compute t...
Preprint
Full-text available
In this paper, a general framework for linear secure distributed matrix multiplication (SDMM) is introduced. The model allows for a neat treatment of straggling and Byzantine servers via a star product interpretation as well as simplified security proofs. Known properties of star products also immediately yield a lower bound for the recovery thresh...
Preprint
Full-text available
This work considers the problem of distributing matrix multiplication over the real or complex numbers to helper servers, such that the information leakage to these servers is close to being information-theoretically secure. These servers are assumed to be honest-but-curious, i.e., they work according to the protocol, but try to deduce information...
Article
This work considers the problem of privately outsourcing the computation of a matrix product over a finite field ${\mathbb {F}}_{q}$ to $N$ helper servers. These servers are considered to be honest but curious, i.e. , they behave according to the protocol but will try to deduce information about the user’s data. Furthermore, any set of up to...

Network

Cited By