Function Computation Without Secure Links: Information and Leakage Rates
Document Type
Conference Proceeding
Publication Date
1-1-2022
Abstract
Consider L users, who each holds private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user can make a single use of a public and noiseless broadcast channel. In this setting, and in the absence of any additional resources such as secure links, we study the optimal communication rates and minimum information leakages on the private user data that are achievable. Specifically, we study the information leakage of the user data at the fusion center (beyond the knowledge of the function output), as well as at predefined groups of colluding users who eavesdrop one another. We derive the capacity region when the user data is independent, and inner and outer regions for the capacity region when the user data is correlated.
Identifier
85136303917 (Scopus)
ISBN
[9781665421591]
Publication Title
IEEE International Symposium on Information Theory Proceedings
External Full Text Location
https://doi.org/10.1109/ISIT50566.2022.9834387
ISSN
21578095
First Page
1223
Last Page
1228
Volume
2022-June
Grant
CCF-2201824
Fund Ref
National Science Foundation
Recommended Citation
Chou, Rémi A. and Kliewer, Jörg, "Function Computation Without Secure Links: Information and Leakage Rates" (2022). Faculty Publications. 3464.
https://digitalcommons.njit.edu/fac_pubs/3464