Abstract
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, simplified lossless and lossy rate regions are characterized, and one achievable region is evaluated as an example scenario.
1. Introduction
We consider function computation scenarios in a network with multiple nodes involved. Each node observes a random sequence, and all observed random sequences are modeled to be correlated. Recent advancements in network function virtualization [1] and distributed machine learning applications [2] make function computation in a wireless network via software defined networking an important practical problem that should be tackled to improve the performance of future communication systems. In a classic function computation scenario, the nodes exchange messages through authenticated, noiseless, and public communication links, which results in undesired information leakage about the computed function [3,4,5]. Furthermore, it is possible to reduce the amount of public communication [6,7] by using distributed lossless or lossy source coding methods; see [8,9,10,11,12] for several extensions. The former method uses Slepian-Wolf (SW) coding [13] constructions, and the latter allows the computed function to be a distorted version of the target function and applies Wyner-Ziv (WZ) coding [14] methods, which result in further reductions compared to the former. A decrease in public communication is also important in order to limit the information about the computed function leaked to an eavesdropper in the same network, i.e., secrecy leakage. In addition to the public messages, an eavesdropper has generally access to a random sequence correlated with other sequences; see [15,16,17] for various secure function computation extensions.
An important addition to the secure function computation model is a privacy constraint that measures the amount of information about the observed sequence leaked to an eavesdropper [18]. Providing privacy is necessary to ensure confidentiality of a private sequence that can be reused for future function computations [19]. An extension of the results in [18] are given in [20], where two privacy constraints are considered on a remote source whose different noisy measurements are observed by multiple nodes in the same network. The extension in [20] is different from the previous secure and private function computation models due to the assumption that there exists a remote source that is the main reason for the correlation between the random sequences observed by the nodes in the same network. It is illustrated via practical examples that considering a remote source hinders unexpected decrease in reliability and unnoticed secrecy leakage [19]. Similarly, such a remote source model is proposed, e.g., in [21] for biometric secrecy and in [22] for user or device authentication problems. It is shown in [20] that with such a remote source model, two different privacy leakage rate values should be limited, unlike a single constraint considered in [18].
We consider a private remote source whose three noisy versions are used for secure single-function computation. Suppose two nodes transmit public indices to a fusion center to compute one function. In [20], for each function computation, one node sends a public index to a fusion center. In [18], cases with two transmitting nodes for function computation are considered for a visible source model, whose results are improved in this work for a remote source model with an additional privacy leakage constraint. Furthermore, we also consider function computation scenarios where the function computed is allowed to be a distorted version of the target function, which is relevant for various recent function computation applications.
1.1. Models for Function Inputs and Outputs
We consider noisy remote source output measurements that are independent and identically distributed (i.i.d.) according to a fixed probability distribution and that are inputs of a target function. This model is reasonable if, e.g., one uses transform-coding algorithms from [19,23,24,25,26,27,28] to extract almost i.i.d. symbols, as applied in the biometric security, physical unclonable function, and image and video coding literature. Furthermore, the set of target functions we study are applied per letter; i.e., the same function is applied to each input symbol (see Section 2 below). These functions are realistic and are used in various recent applications, such as distributed and federated learning applications where the same loss function is applied to each data example [29].
1.2. Summary of Contributions
We extend the lossless and lossy rate region analysis of the single-function computation model with one transmitting node in [20] to consider two transmitting nodes with joint secrecy and privacy constraints, as well as a distortion constraint on the computed function. A summary of the main contributions is as follows.
- The lossless single-function computation model with two transmitting nodes is considered, and an inner bound for the rate region that characterizes the optimal trade-off between secrecy, privacy, storage, and distortion constraints is established by using the output statistics of a random binning (OSRB) method [30,31]. An outer bound for the same rate region is also provided by using standard properties of Shannon entropy. Inner and outer bounds are shown to not match in general due to different Markov chains imposed.
- The proposed inner and outer bounds are extended for the lossy single-function computation model with two transmitting nodes by considering a distortion metric. Furthermore, effects of considering a distortion constraint, rather than a reliability constraint, on the function computation are discussed.
- For both partially invertible functions, which define a set that is a proper superset of the set of invertible functions, and invertible functions, we characterize simplified lossless and lossy rate regions.
- The simplified rate regions for invertible functions are further simplified when the eavesdropper’s measurement channel is physically degraded with respect to the fusion center’s channel or vice versa, which results in different bounds on the rates.
- We evaluate a simplified rate region for a physically degraded case with multiplicative Bernoulli noise components.
We remark that the new contributions in this work as compared to [32,33] include the characterization of the rate region for a physically-degraded channel and the evaluation of the rate region for an example lossless single-function computation scenario, which are mentioned in the last two bullet points above. Furthermore, additional discussions to compare lossless and lossy function computation models are given, the function computation literature review is extended, and discussions about why the considered model is realistic are provided.
1.3. Organization
This paper is organized as follows. In Section 2, we introduce the lossless and lossy single-function computation problems with two transmitting nodes under secrecy, privacy, storage, and reliability or distortion constraints. In Section 3, we present the inner and outer bounds for the rate regions of the introduced problems and discuss that the bounds differ because of different Markov chains imposed. In Section 4, we characterize simplified lossless and lossy rate regions for invertible functions, partially invertible functions, and two different degraded measurement channels, and a rate region for an example case is evaluated. In Section 5, we offer proofs of the inner and outer bounds for the lossless single-function computations with two transmitting nodes. In Section 6, we conclude the paper.
1.4. Notation
Upper case letters represent random variables and lower case letters their realizations. A superscript denotes a sequence of variables, e.g., , and a subscript i denotes the position of a variable in a sequence. A random variable has probability distribution . Calligraphic letters such as denote sets, and set sizes are written as . Given any , we define . as the binary entropy function for any .
2. System Model
We consider the single-function computation model with two transmitting nodes illustrated in Figure 1. Noisy measurements and of an i.i.d. remote source through memoryless channels and , respectively, are observed by two legitimate nodes in a network. Similarly, other noisy measurements and of the same remote source are observed by the fusion center and eavesdropper (Eve), respectively, through another memoryless channel . Encoders and of the legitimate nodes send indices and , respectively, to the fusion center over public communication links with storage rate constraints. The fusion center decoder then uses its observed noisy sequence and the public indices and to estimate a function such that
Figure 1.
Single-function computation problem with two transmitting nodes under secrecy, privacy, and storage (or communication) constraints.
The source and measurement alphabets are finite sets.
A natural secrecy leakage constraint is to minimize the information leakage about the function output to the eavesdropper. However, its analysis depends on the specific function computed, so we impose below another secrecy leakage constraint that does not depend on the function used and that provides an upper bound for secrecy leakage for all functions, as considered in [18,20]. Furthermore, we impose two privacy leakage constraints to minimize the information leakage about to the fusion center and eavesdropper because the same remote source would be measured if another function would be computed in the same network (see also [19] for motivations to consider privacy leakage with respect to a remote source) as well as public storage constraints that minimize the rate of storage for transmitting nodes.
We next define lossless and lossy single-function computation rate regions.
2.1. Lossless Single-Function Computation
Consider the single-function computation model illustrated in Figure 1. The corresponding lossless rate region is defined as follows.
Definition 1.
A lossless tuple is achievable if, for any , there exist , two encoders, and one decoder such that
The lossless region is the closure of the set of all achievable lossless tuples.
2.2. Lossy Single-Function Computation
The corresponding lossy rate region for the single-function computation model illustrated in Figure 1 is defined as follows.
3. Inner and Outer Bounds
3.1. Lossless Single-Function Computation
We first extend the notion of admissibility defined in [6] for a single auxiliary random variable to two auxiliary random variables, used in the inner and outer bounds given below for lossless function computation; see also Theorem 3 of [18].
Definition 3.
A pair of (vector) random variables is admissible for a function if we have
and
form Markov chains.
We next provide inner and outer bounds for the lossless region ; see Section 5 for a proof sketch.
Theorem 1.
(Inner Bound): An achievable lossless region is the union over all , , , , , , and of the rate tuples such that the pair is admissible for the function and
where we have
(Outer Bound): An outer bound for the lossless region is the union of the rate tuples in (13), (16)–(18), and
over all , , , , , , and such that pair is admissible for the function and
form Markov chains. One can limit the cardinalities to , , , , and .
We remark that if the joint probability distribution in (19) is imposed on the outer bound, (20) and (21) recover (14) and (15), respectively, because then
form Markov chains for (19). However, the outer bound that satisfies (22) and (23) defines a rate region that is in general larger than the rate region defined by the inner bound that satisfies (19). Thus, inner and outer bounds generally differ. The results in Theorem 1 recover previous results including Theorem 3 of [18] and, naturally, also other results that are recovered by these previous results such as the SW coding region.
3.2. Lossy Single-Function Computation
We next provide inner and outer bounds for the lossy region ; see below for a proof sketch.
Theorem 2.
Proof Sketch
The achievability proof of the lossy function computation problem follows from the achievability proof of its lossless version given in Section 5.1 by replacing the admissibility constraint with the constraint that , , , and are chosen such that there exists a function that satisfies
where such that when . Since all tuples are in the jointly typical set with high probability, by the typical average lemma [34] p. 26, constraint in (8) is satisfied.
The proof of the outer bound applies the standard properties of the Shannon entropy and follows mainly from the outer bound proof for the lossless function computation problem given in Section 5.2. However, the proof for the lossless function computation problem requires the auxiliary random variables to be admissible as defined in Definition 3, unlike the lossy function computation problem. Thus, the outer bound proof for Theorem 2 follows by replacing the admissibility step (96) in the outer bound proof for the lossless function computation problem with the step
where follows by (8) and (9), follows since there exists a function that achieves a distortion that is not greater than the distortion achieved by , where the distortion is measured with respect to , since has additional inputs, follows from the Markov chain given in (100), and follows from the definitions of and given in (91) and (92), respectively. Furthermore, the proof of the cardinality bounds for the lossy case follows from the proof for the lossless case since we preserve the same probability and conditional entropy values as being preserved for the lossless function computation problem with the addition of preserving the value of , following from the Markov chain
□
Entirely similar to Theorem 1, the inner and outer bounds given in Theorem 2 do not match in general because of different Markov chains imposed.
Remark 1.
Since all secrecy and privacy rate terms given in the outer bounds in Theorems 1 and 2, i.e., lower bounds in (13), (17), and (18), are generally strictly positive, strong secrecy or strong privacy constraints cannot be satisfied in general for the lossless and lossy single-function computation problems.
We next provide simplified rate regions, for various sets of computed functions and measurement channels .
4. Rate Regions for Special Sets of Computed Functions and Measurement Channels
The terms that characterize simplified rate regions of the lossless and lossy function computation problems for various sets of functions and channels are the same, except (1) removal of the admissibility requirement; (2) addition of a distortion constraint; and (3) increase in the cardinality bounds on the auxiliary random variables for the lossy case as compared to the lossless case. Thus, we provide simplified rate regions only for the lossless case. However, we remark that the optimal auxiliary random variables for lossless and lossy cases might differ. Therefore, the corresponding lossless and lossy rate regions might look different for the same joint probability distribution .
4.1. Partially Invertible Functions
We now impose the condition that the function is partially invertible with respect to , i.e., we have [9,35]
For such functions, it is straightforward to show that we have the following simplified rate region for the lossless function computation problem with two transmitting nodes. The proof of Lemma 1 follows from Theorem 1 by assigning and constant and then by applying the Markov chain (23) to (13). Furthermore, by symmetry, the simplified lossless rate region for a function that is partially invertible with respect to can be obtained by assigning and constant and then applying (22) to (13).
Lemma 1.
The lossless rate region when is a partially invertible function with respect to includes the set of all tuples such that is admissible for the function and
such that (23) forms a Markov chain. One can limit the cardinalities to , , and .
4.2. Invertible Functions
Suppose now we impose the condition that the function is invertible; i.e., we have [9,35]
We provide in Lemma 2 below simplified rate region for the lossless function computation problem with two transmitting nodes when the function is invertible. The proof of Lemma 2 follows from Theorem 1 by assigning , , and constant and .
Lemma 2.
The lossless rate region when is an invertible function includes the set of all tuples satisfying
where forms a Markov chain. One can limit the cardinality to .
4.3. Invertible Functions and Two Different Degraded Channels
The lossless rate region given in Lemma 2 can be further simplified by imposing conditions on the measurement channel in addition to the function being invertible. We next characterize further simplified lossless rate regions for two different physically degraded channels.
4.3.1. Eve’s Channel Is Physically Degraded
Suppose the measurement channel is physically degraded such that
For invertible functions and physically degraded measurement channels as defined in (45), we provide further simplified lossless rate region in Lemma 3. The proof of Lemma 3 follows from Lemma 2, and by using the following Markov chain for this case
which follows by (45).
4.3.2. Fusion Center’s Channel Is Physically Degraded
Suppose the measurement channel is physically degraded such that
For invertible functions and physically degraded measurement channels as defined in (49), we provide a simplified lossless rate region in Lemma 4. The proof of Lemma 4 follows from Lemma 2 and by using the following Markov chain for this case
which follows by (49).
Lemma 4.
Remark 2.
The rate regions given in Lemmas 2–4 can be plotted by computing the terms that characterize the regions since is fixed for function computation problems considered. However, the rate region given in Lemma 1, similar to the inner bounds given in Theorems 1 and 2, might not be easy to characterize due to the requirement to optimize the auxiliary random variables whose cardinalities are bounded by large terms. Thus, evaluating the rate region for a function computation problem with two transmitting terminals is generally significantly more difficult than characterization of the rate region for function computation with one transmitting terminal; see [20] for an example of an information bottleneck for the latter problem.
We next evaluate an inner bound for the lossless rate region by using Lemma 4 for specific measurement channels when is an invertible function.
4.4. Lossless Rate Region Example
Suppose measurement channels in Figure 1 have binary input and output alphabets with multiplicative Bernoulli noise components; i.e., we have and
where , , X, and are mutually independent, and we have , , , , , and for fixed , so (49) is satisfied; see also Section IV-A of [36]. Using Lemma 4 for the given probability distributions, we evaluate an inner bound for the lossless rate region for an invertible function computation scenario with two transmitting nodes, in which, e.g., , , , and and obtain the lossless rate region that is characterized by
where the sum-storage rate constraint is active since the sum of the bounds on and is smaller than the bound on .
5. Proof of Theorem 1
5.1. Inner Bound
Proof Sketch
The OSRB method [30] is used for the proof of achievability by applying the steps given in Section 1.6 of [37]. Let
be i.i.d. according to that can be obtained from (19) with fixed , , , and such that the pair is admissible for a function , so is also admissible since random variables in (57) are i.i.d.
To each , assign two random bin indices such that and . Furthermore, to each , assign two random indices such that and . Similarly, random indices and are assigned to each and , respectively. The indices , and represent the public choice of two encoders and one decoder, whereas and are the public messages sent by the encoders and , respectively, to the fusion center.
We consider the following decoding order:
- observing , the decoder estimates as ;
- observing , the decoder estimates as ;
- observing , the decoder estimates as ;
- observing , the decoder estimates as .
By swapping indices 1 and 2 in the decoding order, another corner point in the achievable rate region is obtained, so we analyze the given decoding order but also provide the results for the other corner point.
Consider Step 1 in the decoding order given above. Using an SW [13] decoder, one can reliably estimate from such that the expected value of the error probability taken over the random bin assignments vanishes when , if we have Lemma 1 of [30]
Similarly, Step 2–4 estimations are reliable if we have
where follows from the Markov chain . Therefore, (2) is satisfied if (58)–(61) are satisfied.
The public index is almost independent of , so it is almost independent of , if we have Theorem 1 of [30]
because then the expected value, which is taken over the random bin assignments, of the variational distance between the joint probability distributions and , vanishes when . Furthermore, the public index is almost independent of , so it is almost independent of , if we have
Similarly, is almost independent of if we have
and is almost independent of if we have
Public Message (Storage) Rates: (67) and (71) result in a public message (storage) rate of
where follows because forms a Markov chain and follows because form a Markov chain. Furthermore, (69) and (73) result in a storage rate of
where follows from the Markov chain and from . We remark that if the indices 1 and 2 in the decoding order given above are swapped, the other corner point with
is achieved.
Privacy Leakage to Decoder: We have
where
follows for some with when because
since (1) by (62) is almost independent of ; (2) by (63) is almost independent of and because determines ; (3) by (64) is almost independent of and because determine ; (4) by (65) is almost independent of and because determine ;
follows because determine and from the Markov chains and ;
follows because are i.i.d.
Privacy Leakage to Eve: We have
where follows because form a Markov chain, follows since determine , follows for some such that when because can reliably recover by (58), and similarly because can reliably recover by (59) both due to the Markov chain , follows because determine , follows because can reliably recover by (60) and the inequality
that follows from
since form a Markov chain. Furthermore, can reliably recover by (61) and the inequality
that can be proved entirely the same as (82) by using the Markov chain , and follows because are i.i.d.
In (80), obtaining single-letter bounds on the term requires analysis of numerous decodability cases, whereas there are only six different decodability cases analyzed in [20] for secure function computation with a single transmitting node. To simplify our analysis by applying the results in [20], we combine the decoding order Steps 1 and 2 given above such that are treated jointly, and, similarly, we combine Steps 3 and 4 such that are treated jointly. Using the combined steps, we can consider the six decodability cases analyzed in Section V-A of [20] by replacing with and with , respectively, in the proof. Since in (80) the second term can be obtained by applying the same replacement to the second term in Equation (54) of [20], we obtain from (80) and these decodability analyses that
for some such that when .
Secrecy Leakage (to Eve): We obtain
where follows from the Markov chain , follows since determine , follows because can reliably recover by (58), and similarly because can reliably recover by (59) both due to the Markov chain , follows since determine , follows because can reliably recover by (60) and the inequality
that can be proved similarly to (82) due to the Markov chain . Furthermore, can reliably recover by (61) and the inequality
that can be proved by using the Markov chain , and follows because are i.i.d.
We remark that the terms in (86) are entirely similar to the terms in (80). One can show that all steps of the decodability analysis from Section V-A of [20] that is applied to (80) can be applied also to (86) by replacing X with , so we obtain
We consider that the public indices are generated uniformly at random and the encoders generate and according to obtained from the binning scheme above. This procedure induces a joint probability distribution that is almost equal to fixed as in (19) Section 1.6 in [37]. Since the privacy and secrecy leakage metrics considered above are expectations over all possible realizations , applying the selection lemma (Lemma 2.2 of [38]), these results prove the achievability for Theorem 1 by choosing an such that when . We remark that the achievable region is convexified by using a time-sharing random variable Q such that , required because of the operation.□
5.2. Outer Bound
Proof Sketch
Assume that for some and , there exist two encoders and a decoder such that (2)–(7) are satisfied for some tuple . Let
that satisfy the Markov chains
Admissibility of : Define
such that if . Using Fano’s inequality and (2), we obtain
where follows from Lemma 2 of [39] that proves that when , there exists an i.i.d. random variable that satisfies both
and the Markov chain
follows from the data processing inequality because of the Markov chain
and permits randomized decoding, follows from the Markov chain
and follows from the definitions of and .
Public Message (Storage) Rates: We obtain
where follows from (4), follows from the Markov chain
follows from the data processing inequality applied to the Markov chain
follows from the definition of , and follows from (93). Similarly, one can show by symmetry that we have
Now we consider the sum-rate bound such that
where follows from (4) and (5), follows from Csiszár’s sum identity [40], follows because are i.i.d., follows from the data processing inequality applied to the Markov chains
follows from the definitions of and , and follow from the Markov chain
follows from the Markov chain
Privacy Leakage to Decoder: We have
where follows from (6) and from the Markov chain , follows from Csiszár’s sum identity, follows from the Markov chain
follows because are i.i.d., follows from the definitions of and , and follows from the Markov chain
Privacy Leakage to Eve: We have
where follows from (7) and from the Markov chain , follows from Csiszár’s sum identity, follows from the Markov chain in (112), follows because are i.i.d., follows from the definitions of , , and , and follows from the Markov chain
Secrecy Leakage (to Eve): We obtain
where follows from (3), follows because are i.i.d. and from Csiszár’s sum identity and the Markov chain
follows because are i.i.d. and from the data processing inequality applied to the Markov chain
follows from the definitions of , , , and , follows from the Markov chain given in (108), and follows from the Markov chain
Introduce a uniformly distributed time-sharing random variable that is independent of other random variables, and define , , , , , , , , , and , so
form Markov chains. The proof of the outer bound follows by letting .
Cardinality Bounds: We use the support lemma Lemma 15.4 of [40] to prove the cardinality bounds and apply similar steps as in [18,20], so we omit the proof. □
6. Conclusions
We considered the function computation problem, where three nodes observe correlated random variables and aim to compute a target function of their observations at the fusion center node. We modeled the source of the correlation between these nodes by positing that all three random variables are noisy observations of a remote random source. Furthermore, we imposed one secrecy, two privacy, and two storage constraints with operational meanings on this function computation problem to define a lossless rate region by considering an eavesdropper that observes a correlated random variable. The lossless function computation problem was extended by allowing the function computed to be a distorted version of the target function, which defined the lossy function computation problem.
We proposed inner and outer bounds for the lossless and lossy rate regions. The secrecy leakage and privacy leakage rates that are measured with respect to the eavesdropper were shown to be different due to the remote source considered, unlike in the literature. Furthermore, we characterized a simplified rate region for functions that are partially invertible with respect to one of the transmitting node observations as well as for invertible functions. Moreover, we considered two different physical-degradation cases for the measurement channels of the eavesdropper and fusion center when the function computed was invertible. We derived the corresponding simplified rate regions, one of which is evaluated as an example scenario, and proved that no auxiliary or time-sharing random variable is necessary to characterize these regions.
In future work, we will propose inner and outer bounds for the lossless and lossy multi-function computation problems with multiple transmitting nodes and characterize the rate regions for multi-function computations when the function computed is invertible.
Funding
This research was supported by the German Federal Ministry of Education and Research (BMBF) within the national initiative for “Post Shannon Communication (NewCom)” under the Grant 16KIS1004 and by the German Research Foundation (DFG) under the Grant SCHA 1944/9-1.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Acknowledgments
O. Günlü thanks Matthieu Bloch and Rafael F. Schaefer for their contributions to the conference papers used in this work.
Conflicts of Interest
The author declares no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.
References
- Mijumbi, R.; Serrat, J.; Gorricho, J.L.; Bouten, N.; De Turck, F.; Boutaba, R. Network Function Virtualization: State-of-the-Art and Research Challenges. IEEE Commun. Surv. Tutor. 2016, 18, 236–262. [Google Scholar] [CrossRef]
- Predd, J.B.; Kulkarni, S.B.; Poor, H.V. Distributed learning in wireless sensor networks. IEEE Sign. Process. Mag. 2006, 23, 56–69. [Google Scholar] [CrossRef]
- Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, Chicago, IL, USA, 3–5 November 1982; pp. 160–164. [Google Scholar]
- Yao, A.C. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science, Toronto, ON, Canada, 27–29 October 1986; pp. 162–167. [Google Scholar]
- Tyagi, H.; Narayan, P.; Gupta, P. When Is a Function Securely Computable? IEEE Trans. Inf. Theory 2011, 57, 6337–6350. [Google Scholar] [CrossRef]
- Orlitsky, A.; Roche, J.R. Coding for computing. IEEE Trans. Inf. Theory 2001, 47, 903–917. [Google Scholar] [CrossRef]
- Bloch, M.; Günlü, O.; Yener, A.; Oggier, F.; Poor, H.V.; Sankar, L.; Schaefer, R.F. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications. IEEE J. Sel. Areas Inf. Theory 2021, 2, 5–22. [Google Scholar] [CrossRef]
- Ma, N.; Ishwar, P. Some Results on Distributed Source Coding for Interactive Function Computation. IEEE Trans. Inf. Theory 2011, 57, 6180–6195. [Google Scholar] [CrossRef]
- Sefidgaran, M.; Tchamkerten, A. Computing a function of correlated Sources: A rate region. In Proceedings of the 2011 IEEE International Symposium on Information Theory, St. Petersburg, Russia, 31 July–5 August 2011; pp. 1856–1860. [Google Scholar]
- Nazer, B.; Gastpar, M. Computation Over Multiple-Access Channels. IEEE Trans. Inf. Theory 2007, 53, 3498–3516. [Google Scholar] [CrossRef]
- Kowshik, H.; Kumar, P.R. Optimal Function Computation in Directed and Undirected Graphs. IEEE Trans. Inf. Theory 2012, 58, 3407–3418. [Google Scholar] [CrossRef]
- Kannan, S.; Viswanath, P. Multi-Session Function Computation and Multicasting in Undirected Graphs. IEEE J. Sel. Areas Commun. 2013, 31, 702–713. [Google Scholar] [CrossRef][Green Version]
- Slepian, D.; Wolf, J. Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory 1973, 19, 471–480. [Google Scholar] [CrossRef]
- Wyner, A.D.; Ziv, J. The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 1976, 22, 1–10. [Google Scholar] [CrossRef]
- Goldenbaum, M.; Boche, H.; Poor, H.V. On secure computation over the binary modulo-2 adder multiple-access wiretap channel. In Proceedings of the 2016 IEEE Information Theory Workshop (ITW), Cambridge, UK, 11–14 September 2016; pp. 21–25. [Google Scholar]
- Tyagi, H.; Watanabe, S. Converses For Secret Key Agreement and Secure Computing. IEEE Trans. Inf. Theory 2015, 61, 4809–4827. [Google Scholar] [CrossRef]
- Prabhakaran, V.; Ramchandran, K. On Secure Distributed Source Coding. In Proceedings of the 2007 IEEE Information Theory Workshop, Lake Tahoe, CA, USA, 2–6 September 2007; pp. 442–447. [Google Scholar]
- Tu, W.; Lai, L. On Function Computation with Privacy and Secrecy Constraints. IEEE Trans. Inf. Theory 2019, 65, 6716–6733. [Google Scholar] [CrossRef]
- Günlü, O. Key Agreement with Physical Unclonable Functions and Biometric Identifiers. Ph.D. Thesis, Technische Universität München, Munich, Germany, 2018. [Google Scholar]
- Günlü, O.; Bloch, M.; Schaefer, R.F. Secure Multi-Function Computation with Private Remote Sources. arXiv 2021, arXiv:2106.09485. [Google Scholar]
- Wang, Y.; Rane, S.; Draper, S.C.; Ishwar, P. A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1825–1840. [Google Scholar] [CrossRef][Green Version]
- Günlü, O.; Kittichokechai, K.; Schaefer, R.F.; Caire, G. Controllable Identifier Measurements for Private Authentication With Secret Keys. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1945–1959. [Google Scholar] [CrossRef]
- Li, N.; Zhang, Y.; Kuo, C.C.J. Explainable Machine Learning based Transform Coding for High Efficiency Intra Prediction. arXiv 2020, arXiv:2012.11152. [Google Scholar]
- Voloshynovskiy, S.; Koval, O.; Holotyak, T.; Beekhof, F. Privacy enhancement of common randomness based authentication: Key rate maximized case. In Proceedings of the 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), London, UK, 6–9 December 2009; pp. 86–90. [Google Scholar]
- Wayman, J.; Jain, A.; Maltoni, D.; Maio, D. Biometric Systems: Technology, Design and Performance Evaluation; Springer: London, UK, 2005. [Google Scholar]
- De Groot, J.; Škoric, B.; De Vreede, N.; Linnartz, J.P. Information leakage of continuous-source zero secrecy leakage helper data schemes. Citeseer Gen 2012, 1, 1–16. [Google Scholar]
- Voloshynovskiy, S.; Koval, O.; Holotyak, T.; Beekhof, F.; Farhadzadeh, F. Privacy amplification of content identification systems based on fingerprint bit reliability. In Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, Seattle, WA, USA, 12–15 December 2010; pp. 1–6. [Google Scholar]
- Campisi, P. Security and Privacy in Biometrics; Springer: London, UK, 2013. [Google Scholar]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-Efficient Learning of Deep Networks from Decentralized Data. Int. Conf. Artif. Intell. Statist. 2017, 54, 1273–1282. [Google Scholar]
- Yassaee, M.H.; Aref, M.R.; Gohari, A. Achievability Proof via Output Statistics of Random Binning. IEEE Trans. Inf. Theory 2014, 60, 6760–6786. [Google Scholar] [CrossRef]
- Holenstein, T.; Renner, R. On the Randomness of Independent Experiments. IEEE Trans. Inf. Theory 2011, 57, 1865–18716. [Google Scholar] [CrossRef]
- Günlü, O.; Bloch, M.; Schaefer, R.F. Secure Lossy Function Computation with Multiple Private Remote Source Observations. In Proceedings of the 25th International ITG Workshop on Smart Antennas (WSA 2021), French Riviera, France, 10–12 November 2021. [Google Scholar]
- Günlü, O.; Bloch, M.; Schaefer, R.F. Multiple Noisy Private Remote Source Observations for Secure Function Computation. In Proceedings of the Asilomar Conference on Signals, Systems & Computers, Pacific Grove, CA, USA, 31 October–3 November 2021. [Google Scholar]
- Gamal, A.E.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Ericson, T.; Körner, J. Successive encoding of correlated sources. IEEE Trans. Inf. Theory 1983, 29, 390–395. [Google Scholar] [CrossRef]
- Ahmadipour, M.; Wigger, M.; Kobayashi, M. Joint Sensing and Communication over Memoryless Broadcast Channels. In Proceedings of the IEEE Information Theory Workshop, Kanazawa, Japan, 17–21 October 2021; pp. 1–5. [Google Scholar]
- Bloch, M. Lecture Notes in Information-Theoretic Security; The Georgia Institute of Technology: Atlanta, GA, USA, 2018. [Google Scholar]
- Bloch, M.; Barros, J. Physical-Layer Security; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Günlü, O.; Schaefer, R.F.; Poor, H.V. Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication. arXiv 2020, arXiv:2001.00847. [Google Scholar]
- Csiszár, I.; Körner, J. Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd ed.; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).