
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; 2) the information leakage to a fusion center with respect to the remote source is considered as a new privacy leakage metric; 3) the function computed is allowed to be a distorted version of the target function, which allows to reduce the storage rate as compared to a reliable function computation scenario in addition to reducing secrecy and privacy leakages; 4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases that include invertible and partially-invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated for an example scenario.
ddc:004, Privatsphäre, FOS: Computer and information sciences, Computer Science - Cryptography and Security, Science, QC1-999, Computer Science - Information Theory, information theoretic privacy, Astrophysics, information theoretic privacy; secure function computation; remote source; distributed computation, Article, Computer Science - Information Retrieval, secure function computation, Distributed computation, Secure function computation, Remote source, remote source, Informationssicherheit, Physics, Information Theory (cs.IT), Q, distributed computation, 004 Informatik, 004, QB460-466, Computer Science - Distributed, Parallel, and Cluster Computing, electrical_electronic_engineering, Physical unclonable function, Distributed, Parallel, and Cluster Computing (cs.DC), Information theoretic privacy, Cryptography and Security (cs.CR), Information Retrieval (cs.IR)
ddc:004, Privatsphäre, FOS: Computer and information sciences, Computer Science - Cryptography and Security, Science, QC1-999, Computer Science - Information Theory, information theoretic privacy, Astrophysics, information theoretic privacy; secure function computation; remote source; distributed computation, Article, Computer Science - Information Retrieval, secure function computation, Distributed computation, Secure function computation, Remote source, remote source, Informationssicherheit, Physics, Information Theory (cs.IT), Q, distributed computation, 004 Informatik, 004, QB460-466, Computer Science - Distributed, Parallel, and Cluster Computing, electrical_electronic_engineering, Physical unclonable function, Distributed, Parallel, and Cluster Computing (cs.DC), Information theoretic privacy, Cryptography and Security (cs.CR), Information Retrieval (cs.IR)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 5 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
