Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

01/11/2022
by   Onur Günlü, et al.
0

The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed sequences; 2) the information leakage to a fusion center with respect to the remote source is considered as a new privacy leakage metric; 3) the function computed is allowed to be a distorted version of the target function, which allows to reduce the storage rate as compared to a reliable function computation scenario in addition to reducing secrecy and privacy leakages; 4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases that include invertible and partially-invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated for an example scenario.

READ FULL TEXT

page 1

page 2

page 3

page 22

research
06/17/2021

Secure Multi-Function Computation with Private Remote Sources

We consider a distributed function computation problem in which parties ...
research
05/10/2022

Secure and Private Source Coding with Private Key and Decoder Side Information

The problem of secure source coding with multiple terminals is extended ...
research
05/17/2020

Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

A basic model for key agreement with a remote (or hidden) source is exte...
research
10/21/2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source

In the present paper, we investigate the fundamental trade-off of identi...
research
01/03/2020

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

The problem of secret-key based authentication under privacy and storage...
research
07/01/2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

A basic model for key agreement with biometric or physical identifiers i...
research
02/05/2019

Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System under Noisy Enrollment

In this study, we investigate fundamental trade-off among identification...

Please sign up or login with your details

Forgot password? Click here to reset