On Secure Computation Over the Binary Modulo-2 Adder Multiple-Access Wiretap Channel

被引:0
|
作者
Goldenbaum, Mario [1 ]
Boche, Holger [2 ]
Poor, H. Vincent [1 ]
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] Tech Univ Munich, Chair Theoret Informat Technol, D-80290 Munich, Germany
关键词
Secure distributed computation; computation coding; multiple-access wiretap channel; physical-layer security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, the problem of securely computing a function over the binary modulo-2 adder multiple-access wiretap channel is considered. The problem involves a legitimate receiver that wishes to reliably and efficiently compute a function of distributed binary sources while an eavesdropper has to be kept ignorant of them. In order to characterize the corresponding fundamental limit, the notion of secrecy computation-capacity is introduced. Although determining the secrecy computation-capacity is challenging for arbitrary functions, it surprisingly turns out that if the function perfectly matches the algebraic structure of the channel and the joint source distribution fulfills certain conditions, the secrecy computation-capacity equals the computation capacity, which is the supremum of all achievable computation rates without secrecy constraints. Unlike the case of securely transmitting messages, no additional randomness is needed at the encoders nor does the legitimate receiver need any advantage over the eavesdropper. The results therefore show that the problem of securely computing a function over a multiple-access wiretap channel may significantly differ from the one of securely communicating messages.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] On Modulo-Sum Computation Over an Erasure Multiple-Access Channel
    Khisti, Ashish
    Hern, Brett
    Narayanan, Krishna
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (07) : 4129 - 4138
  • [2] Secure Computation of Linear Functions Over Linear Discrete Multiple-Access Wiretap Channels
    Goldenbaum, Mario
    Boche, Holger
    Poor, H. Vincent
    [J]. 2016 50TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2016, : 1670 - 1674
  • [3] Secure Communication Over Finite State Multiple-Access Wiretap Channel With Delayed Feedback
    Dai, Bin
    Ma, Zheng
    Xiao, Ming
    Tang, Xiaohu
    Fan, Pingzhi
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 723 - 736
  • [4] Multiple-Access Relay Wiretap Channel
    Dai, Bin
    Ma, Zheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1835 - 1849
  • [5] Coding for the multiple-access adder channel
    Laczay, B.
    [J]. General Theory of Information Transfer and Combinatorics, 2006, 4123 : 165 - 195
  • [6] On the capacity of a multiple-access vector adder channel
    A. A. Frolov
    V. V. Zyablov
    [J]. Problems of Information Transmission, 2014, 50 : 133 - 143
  • [7] On the capacity of a multiple-access vector adder channel
    Frolov, A. A.
    Zyablov, V. V.
    [J]. PROBLEMS OF INFORMATION TRANSMISSION, 2014, 50 (02) : 133 - 143
  • [8] Some New Results on the Multiple-Access Wiretap Channel
    Dai, Bin
    Ma, Zheng
    [J]. ENTROPY, 2014, 16 (08): : 4693 - 4712
  • [9] On Capacity Computation for the Two-User Binary Multiple-Access Channel
    Buehler, Joerg
    Wunder, Gerhard
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2381 - +
  • [10] Role of Feedback in Modulo-Sum Computation over Erasure Multiple-Access Channels
    Wang, I-Hsiang
    Lin, Shih-Chun
    Huang, Yu-Chih
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2293 - 2297