{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:21Z","timestamp":1775745321250,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council (ERC) Starting Grant BEACON","doi-asserted-by":"publisher","award":["677854"],"award-info":[{"award-number":["677854"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010665","name":"European Union\u2019s H2020 Research and Innovation Program under the Marie Sklodowska-Curie Action Sustainable Cellular Networks Harvesting Ambient Energy","doi-asserted-by":"publisher","award":["675891"],"award-info":[{"award-number":["675891"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"U.K. Engineering and Physical Sciences Research Council (EPSRC) through the CHIST-ERA Program","doi-asserted-by":"publisher","award":["EP\/T023600\/1"],"award-info":[{"award-number":["EP\/T023600\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"U.K. Engineering and Physical Sciences Research Council (EPSRC) through the CHIST-ERA Program","doi-asserted-by":"publisher","award":["CHISTERA-18-SDCDN-001"],"award-info":[{"award-number":["CHISTERA-18-SDCDN-001"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tit.2022.3158868","type":"journal-article","created":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T20:32:16Z","timestamp":1646944336000},"page":"4666-4680","source":"Crossref","is-referenced-by-count":36,"title":["Secure Distributed Matrix Computation With Discrete Fourier Transform"],"prefix":"10.1109","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6002-1346","authenticated-orcid":false,"given":"Nitish","family":"Mital","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Imperial College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-4862","authenticated-orcid":false,"given":"Cong","family":"Ling","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Imperial College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7725-395X","authenticated-orcid":false,"given":"Deniz","family":"Gunduz","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Imperial College London, London, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394944"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1515\/tmmp-2016-0031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54568-9_3"},{"key":"ref5","first-page":"703","article-title":"New protocols for secure linear algebra: Pivoting-free elimination and fast block-recursive matrix decomposition","author":"Bouman","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2736066"},{"key":"ref8","first-page":"3368","article-title":"Gradient coding: Avoiding stragglers in distributed learning","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","volume":"70","author":"Tandon"},{"key":"ref9","first-page":"4403","article-title":"Polynomial codes: An optimal design for high-dimensional coded matrix multiplication","volume-title":"Advances in Neural Information Processing Systems","author":"Yu","year":"2017"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2929328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437852"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437563"},{"key":"ref13","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","volume":"89","author":"Yu"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174542"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647313"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2975021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3112952"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2828310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2890285"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174167"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174230"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849606"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174509"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437651"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335756"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2608892"},{"key":"ref29","article-title":"Rate-efficiency and straggler-robustness through partition in distributed two-sided secure matrix computation","author":"Kakar","year":"2018","journal-title":"arXiv:1810.13006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80029-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2004.1328724"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9798707\/09732990.pdf?arnumber=9732990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:04:24Z","timestamp":1705532664000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9732990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":31,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tit.2022.3158868","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}