Secure Computation of Linear Functions Over Linear Discrete Multiple-Access Wiretap Channels

被引:0
|
作者
Goldenbaum, Mario [1 ]
Boche, Holger [2 ]
Poor, H. Vincent [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Tech Univ Munich, Chair Theoret Informat Technol, Munich, Germany
基金
美国国家科学基金会;
关键词
Secure distributed computation; computation coding; multiple-access wiretap channel; physical-layer security; SECRECY; RELAY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a joint source-channel coding approach is taken to the problem of securely computing a function of distributed sources over a multiple-access wiretap channel that is linear with respect to a finite field. It is shown that if the joint source distribution fulfills certain conditions and the function to be computed matches the linear structure of the channel, secrecy comes for free in the sense that the fundamental limit (i.e., the secrecy computation-capacity) is achieved without the need for stochastic encoding. Furthermore, the legitimate receiver does not need any advantage over the eavesdropper, which is in stark contrast to standard physical-layer security results.
引用
收藏
页码:1670 / 1674
页数:5
相关论文
共 50 条
  • [1] Computation over multiple-access channels
    Nazer, Bobak
    Gastpar, Michael
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (10) : 3498 - 3516
  • [2] Expurgation for Discrete Multiple-Access Channels via Linear Codes
    Haim, Eli
    Kochman, Yuval
    Erez, Uri
    [J]. 2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 31 - 35
  • [3] On Secure Computation Over the Binary Modulo-2 Adder Multiple-Access Wiretap Channel
    Goldenbaum, Mario
    Boche, Holger
    Poor, H. Vincent
    [J]. 2016 IEEE INFORMATION THEORY WORKSHOP (ITW), 2016,
  • [4] RELIABLE COMPUTATION OF NOMOGRAPHIC FUNCTIONS OVER GAUSSIAN MULTIPLE-ACCESS CHANNELS
    Goldenbaum, Mario
    Boche, Holger
    Stanczak, Slawomir
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 4814 - 4818
  • [5] Computation over Gaussian multiple-access channels
    Nazer, Bobak
    Gastpar, Mchael
    [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2391 - 2395
  • [6] Lossy transmission of correlated sources over multiple-access wiretap channels
    Salehkalaibar, Sadaf
    Aref, Mohammad Reza
    [J]. IET COMMUNICATIONS, 2015, 9 (06) : 754 - 770
  • [7] Computation of total capacity for discrete memoryless multiple-access channels
    Rezaeian, M
    Grant, A
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (11) : 2779 - 2784
  • [8] Linear Relaying for the Gaussian Multiple-Access and Broadcast Channels
    del Coso, Aitor
    Ibars, Christian
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) : 2024 - 2035
  • [9] On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback
    Dai, Bin
    Li, Chong
    Liang, Yingbin
    Ma, Zheng
    Shamai , Shlomo
    [J]. PROCEEDINGS OF 2020 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2020), 2020, : 397 - 401
  • [10] Secure Communication Over Finite State Multiple-Access Wiretap Channel With Delayed Feedback
    Dai, Bin
    Ma, Zheng
    Xiao, Ming
    Tang, Xiaohu
    Fan, Pingzhi
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 723 - 736