首页 | 本学科首页   官方微博 | 高级检索  
     


Secure linear system computation in the presence of malicious adversaries
Authors:Bo Zhang  FangGuo Zhang
Affiliation:1. Department of Electronic Engineering, Fudan University, Shanghai, 200433, China
Abstract:
A unified framework on distributed estimations in-network using incremental subgradient (IS) methods is introduced. The IS methods meet the requirement of the asynchronously processing, which are efficient solvers developed recently focusing on separable non-differentiable convex optimization problems. The main contribution of this paper is to formalize distributed estimators as equivalent separable convex optimization problems, where general skills and several specific cases on signal estimations are presented. Analytical and simulation results show that the IS framework can solve general nonlinear estimation problems in-network, and achieve comparable performances as the centralized estimators.
Keywords:linear system computation  noisy coding  oblivious transfer  cut-and-choose  secure two-party computation
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号