{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:59:59Z","timestamp":1778605199062,"version":"3.51.4"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/itw54588.2022.9965839","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T20:47:00Z","timestamp":1670446020000},"page":"149-154","source":"Crossref","is-referenced-by-count":13,"title":["Secure MatDot codes: a secure, distributed matrix multiplication scheme"],"prefix":"10.1109","author":[{"given":"Hiram H.","family":"Lopez","sequence":"first","affiliation":[{"name":"Cleveland State University,Department of Mathematics and Statistics,Cleveland,Ohio 44115"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gretchen L.","family":"Matthews","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Mathematics,Blacksburg,VA 24061"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Valvo","sequence":"additional","affiliation":[{"name":"Virginia Tech,Department of Mathematics,Blacksburg,VA 24061"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622429"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3050853"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2940895"},{"key":"ref13","article-title":"Secure distributed matrix computation with discrete fourier transform","author":"mital","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2929328"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1984.1676475"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2321280"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2700859"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/REDUNDANCY52534.2021.9606447"},{"key":"ref19","article-title":"Lagrange coded computing: Optimal design for resiliency, security and privacy","author":"yu","year":"2019","journal-title":"AISTATS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2972166"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2972166"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.140518"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647313"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2877391"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2869791"},{"key":"ref2","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume":"89","author":"yu","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2846601"},{"key":"ref1","article-title":"Polynomial codes: An optimal design for high-dimensional coded matrix multiplication","author":"yu","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2939464"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2713245"}],"event":{"name":"2022 IEEE Information Theory Workshop (ITW)","location":"Mumbai, India","start":{"date-parts":[[2022,11,1]]},"end":{"date-parts":[[2022,11,9]]}},"container-title":["2022 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9965754\/9965755\/09965839.pdf?arnumber=9965839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T19:42:16Z","timestamp":1672083736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9965839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/itw54588.2022.9965839","relation":{},"subject":[],"published":{"date-parts":[[2022,11,1]]}}}