Function computation without secure links: Information and leakage rates

Loading...
Thumbnail Image
Authors
Chou, Rémi
Kliewer, Joerg
Advisors
Issue Date
2022-06-26
Type
Preprint
Keywords
Task analysis , Information theory
Research Projects
Organizational Units
Journal Issue
Citation
R. A. Chou and J. Kliewer, "Function Computation Without Secure Links: Information and Leakage Rates," 2022 IEEE International Symposium on Information Theory (ISIT), 2022, pp. 1223-1228, doi: 10.1109/ISIT50566.2022.9834387.
Abstract

Consider L users, who each holds private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user can make a single use of a public and noiseless broadcast channel. In this setting, and in the absence of any additional resources such as secure links, we study the optimal communication rates and minimum information leakages on the private user data that are achievable. Specifically, we study the information leakage of the user data at the fusion center (beyond the knowledge of the function output), as well as at predefined groups of colluding users who eavesdrop one another. We derive the capacity region when the user data is independent, and inner and outer regions for the capacity region when the user data is correlated. © 2022 IEEE.

Table of Contents
Description
Preprint version available from arXiv. Click on the DOI to access the publisher's version of this article.
Publisher
IEEE
Journal
Book Title
Series
2022 IEEE International Symposium on Information Theory (ISIT)
2022
PubMed ID
DOI
ISSN
2157-8117
EISSN