Network Function Computation With Different Secure Conditions

06/11/2022
by   Min Xu, et al.
0

In this paper, we investigate function computation problems under different secure conditions over a network with multiple source nodes and a single sink node which desires a function of all source messages without error. A wiretapper has access to some edges of the network. Based on different practical requirements, we consider two secure conditions named as secure and user secure respectively. The main parameter concerned here is the computing rate, which is the average times of the target function that can be computed securely or user securely without error for one use of the network. In the secure case, a new upper bound which is tighter than the previous one is provided for arithmetic sum functions and arbitrary networks. Moreover, we show that the improved upper bound is strictly tight for tree-like networks. In the user secure case, we give a sufficient and necessary condition for the existence of user secure network codes and obtain an upper bound for the computation capacity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/14/2022

Secure Network Function Computation for Linear Functions – Part I: Source Security

In this paper, we put forward secure network function computation over a...
research
05/11/2020

Secure Computation to Hide Functions of Inputs

We consider a two-user secure computation problem in which Alice and Bob...
research
01/10/2019

On Secure Capacity of Multiple Unicast Traffic over Two-Layer Networks

This paper studies the problem of secure communication over two-layer ne...
research
05/31/2023

On the Capacity of Secure K-user Product Computation over a Quantum MAC

Inspired by a recent study by Christensen and Popovski on secure 2-user ...
research
06/09/2021

Computing Markov functions of Toeplitz matrices

We investigate the problem of approximating the matrix function f(A) by ...
research
04/22/2022

An Upper Bound of the Information Flow From Children to Parent Node on Trees

We consider the transmission of a state from the root of a tree towards ...
research
09/30/2019

Analysis of error dependencies on NewHope

Among many submissions to the NIST post-quantum cryptography (PQC) proje...

Please sign up or login with your details

Forgot password? Click here to reset