Citation link:
http://dx.doi.org/10.25819/ubsi/10126
DC Field | Value | Language |
---|---|---|
crisitem.author.orcid | 0000-0002-0313-7788 | - |
dc.contributor.author | Günlü, Onur | - |
dc.date.accessioned | 2022-08-05T07:01:47Z | - |
dc.date.available | 2022-08-05T07:01:47Z | - |
dc.date.issued | 2021 | de |
dc.description | Finanziert aus dem Open-Access-Publikationsfonds der Universität Siegen für Zeitschriftenartikel | de |
dc.description.abstract | The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated as an example scenario. | en |
dc.identifier.doi | http://dx.doi.org/10.25819/ubsi/10126 | - |
dc.identifier.uri | https://dspace.ub.uni-siegen.de/handle/ubsi/2215 | - |
dc.identifier.urn | urn:nbn:de:hbz:467-22150 | - |
dc.language.iso | en | de |
dc.rights | Namensnennung 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
dc.source | Entropy, 24 (1), 2022 - https://doi.org/10.3390/e24010110 | de |
dc.subject.ddc | 004 Informatik | de |
dc.subject.other | Information theoretic privacy | en |
dc.subject.other | Secure function computation | en |
dc.subject.other | Remote source | en |
dc.subject.other | Distributed computation | en |
dc.subject.swb | Informationssicherheit | de |
dc.subject.swb | Privatsphäre | de |
dc.subject.swb | Physical unclonable function | de |
dc.title | Function computation under privacy, secrecy, distortion, and communication constraints | en |
dc.type | Article | de |
item.fulltext | With Fulltext | - |
ubsi.publication.affiliation | Department Elektrotechnik - Informatik | de |
ubsi.source.issn | 1099-4300 | - |
ubsi.source.issued | 2022 | de |
ubsi.source.issuenumber | 1 | de |
ubsi.source.link | https://www.mdpi.com/1099-4300/24/1/110/htm | de |
ubsi.source.pages | 21 | de |
ubsi.source.publisher | Multidisciplinary Digital Publishing Institute (MDPI) | de |
ubsi.source.title | Entropy | de |
ubsi.source.volume | 24 | de |
ubsi.subject.ghbs | TWPH | de |
ubsi.subject.ghbs | TWHH | de |
Appears in Collections: | Geförderte Open-Access-Publikationen |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Onur_Günlü_function computation.pdf | 383.75 kB | Adobe PDF | View/Open |
This item is protected by original copyright |
Page view(s)
284
checked on Dec 1, 2024
Download(s)
44
checked on Dec 1, 2024
Google ScholarTM
Check
Altmetric
This item is licensed under a Creative Commons License