Skip to main content

On secure computation over the binary modulo-2 adder multiple-access wiretap channel

Author(s): Goldenbaum, Mario; Boche, Holger; Poor, H Vincent

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr19p2w62t
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGoldenbaum, Mario-
dc.contributor.authorBoche, Holger-
dc.contributor.authorPoor, H Vincent-
dc.date.accessioned2024-02-17T05:15:28Z-
dc.date.available2024-02-17T05:15:28Z-
dc.date.issued2016-10-27en_US
dc.identifier.citationGoldenbaum, Mario, Boche, Holger, Poor, H Vincent. (2016). On secure computation over the binary modulo-2 adder multiple-access wiretap channel. 2016 IEEE Information Theory Workshop (ITW), 10.1109/itw.2016.7606788en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr19p2w62t-
dc.description.abstractIn this paper, the problem of securely computing a function over the binary modulo-2 adder multiple-access wiretap channel is considered. The problem involves a legitimate receiver that wishes to reliably and efficiently compute a function of distributed binary sources while an eavesdropper has to be kept ignorant of them. In order to characterize the corresponding fundamental limit, the notion of secrecy computation-capacity is introduced. Although determining the secrecy computation-capacity is challenging for arbitrary functions, it surprisingly turns out that if the function perfectly matches the algebraic structure of the channel and the joint source distribution fulfills certain conditions, the secrecy computation-capacity equals the computation capacity, which is the supremum of all achievable computation rates without secrecy constraints. Unlike the case of securely transmitting messages, no additional randomness is needed at the encoders nor does the legitimate receiver need any advantage over the eavesdropper. The results therefore show that the problem of securely computing a function over a multiple-access wiretap channel may significantly differ from the one of securely communicating messages.en_US
dc.language.isoen_USen_US
dc.relation.ispartof2016 IEEE Information Theory Workshop (ITW)en_US
dc.rightsAuthor's manuscripten_US
dc.titleOn secure computation over the binary modulo-2 adder multiple-access wiretap channelen_US
dc.typeConference Articleen_US
dc.identifier.doidoi:10.1109/itw.2016.7606788-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
1603.07227.pdf133.85 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.