liu.seSearch for publications in DiVA
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Private Remote Sources for Secure Multi-Function Computation
Chair of Communications Engineering and Security, University of Siegen, Siegen, Germany.ORCID iD: 0000-0002-0313-7788
School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA.ORCID iD: 0000-0001-9315-9050
Chair of Communications Engineering and Security, University of Siegen, Siegen, Germany.ORCID iD: 0000-0002-1702-9075
2022 (English)In: IEEE Transactions on Information Theory, ISSN 0018-9448, E-ISSN 1557-9654, Vol. 68, no 10, p. 6826-6841Article in journal (Refereed) Published
Abstract [en]

We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also secrecy and privacy. Specifically, 1) the function computed should remain secret from an eavesdropper observing the public communication and correlated observations, measured in terms of the information leaked about the arguments of the function, to ensure secrecy regardless of the exact function used; 2) the remote source should remain private from the eavesdropper and the fusion center, measured in terms of the information leaked about the remote source itself. We derive the exact rate regions for lossless and lossy single-function computation and illustrate the lossy single-function computation rate region for an information bottleneck example, in which the optimal auxiliary random variables are characterized for binary-input symmetric-output channels. We extend the approach to lossless and lossy asynchronous multiple-function computations with joint secrecy and privacy constraints, in which case inner and outer bounds for the rate regions that differ only in the Markov chain conditions imposed are characterized.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2022. Vol. 68, no 10, p. 6826-6841
National Category
Communication Systems Signal Processing Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-208975DOI: 10.1109/tit.2022.3182416ISI: 000854619600031Scopus ID: 2-s2.0-85138962167OAI: oai:DiVA.org:liu-208975DiVA, id: diva2:1909492
Funder
German Research Foundation (DFG), SCHA 1944/9-1Available from: 2024-10-30 Created: 2024-10-30 Last updated: 2025-02-27Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Günlü, Onur

Search in DiVA

By author/editor
Günlü, OnurBloch, MatthieuSchaefer, Rafael F.
In the same journal
IEEE Transactions on Information Theory
Communication SystemsSignal ProcessingComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 20 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf