Erasure coding for distributed storage: An overview

SB Balaji, MN Krishnan, M Vajha, V Ramkumar… - Science China …, 2018 - Springer
In a distributed storage system, code symbols are dispersed across space in nodes or
storage units as opposed to time. In settings such as that of a large data center, an important …

Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Speeding up distributed machine learning using codes

K Lee, M Lam, R Pedarsani… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Codes are widely used in many engineering applications to offer robustness against noise.
In large-scale systems, there are several types of noise that can affect the performance of …

Fastsecagg: Scalable secure aggregation for privacy-preserving federated learning

S Kadhe, N Rajaraman, OO Koyluoglu… - ar** the training data on clients'
devices does not provide sufficient privacy, as the model parameters shared by clients can …

The capacity of private information retrieval

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
In the private information retrieval (PIR) problem, a user wishes to retrieve, as efficiently as
possible, one out of K messages from N non-communicating databases (each holds all K …

Erasure coding in windows azure storage

C Huang, H Simitci, Y Xu, A Ogus, B Calder… - 2012 USENIX Annual …, 2012 - usenix.org
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …

Xoring elephants: Novel erasure codes for big data

M Sathiamoorthy, M Asteris, D Papailiopoulos… - arxiv preprint arxiv …, 2013 - arxiv.org
Distributed storage systems for large clusters typically use replication to provide reliability.
Recently, erasure codes have been used to reduce the large storage overhead of three …

SoK of used cryptography in blockchain

M Raikwar, D Gligoroski, K Kralevska - IEEE Access, 2019 - ieeexplore.ieee.org
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …

A family of optimal locally recoverable codes

I Tamo, A Barg - IEEE Transactions on Information Theory, 2014 - ieeexplore.ieee.org
A code over a finite alphabet is called locally recoverable (LRC) if every symbol in the
encoding is a function of a small number (at most r) other symbols. We present a family of …

The capacity of robust private information retrieval with colluding databases

H Sun, SA Jafar - IEEE Transactions on Information Theory, 2017 - ieeexplore.ieee.org
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one
out of K messages from N non-communicating replicated databases (each holds all K …