Function computation without secure links: Information and leakage rates

Loading...
Thumbnail Image
Issue Date
2022-06-26
Authors
Chou, Rémi
Kliewer, Joerg
Advisor
Citation

R. A. Chou and J. Kliewer, "Function Computation Without Secure Links: Information and Leakage Rates," 2022 IEEE International Symposium on Information Theory (ISIT), 2022, pp. 1223-1228, doi: 10.1109/ISIT50566.2022.9834387.

Abstract

Consider L users, who each holds private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user can make a single use of a public and noiseless broadcast channel. In this setting, and in the absence of any additional resources such as secure links, we study the optimal communication rates and minimum information leakages on the private user data that are achievable. Specifically, we study the information leakage of the user data at the fusion center (beyond the knowledge of the function output), as well as at predefined groups of colluding users who eavesdrop one another. We derive the capacity region when the user data is independent, and inner and outer regions for the capacity region when the user data is correlated. © 2022 IEEE.

Table of Content
Description
Preprint version available from arXiv. Click on the DOI to access the publisher's version of this article.
publication.page.dc.relation.uri
DOI