Citation link: http://dx.doi.org/10.25819/ubsi/10126
DC FieldValueLanguage
crisitem.author.orcid0000-0002-0313-7788-
dc.contributor.authorGünlü, Onur-
dc.date.accessioned2022-08-05T07:01:47Z-
dc.date.available2022-08-05T07:01:47Z-
dc.date.issued2021de
dc.descriptionFinanziert aus dem Open-Access-Publikationsfonds der Universität Siegen für Zeitschriftenartikelde
dc.description.abstractThe problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated as an example scenario.en
dc.identifier.doihttp://dx.doi.org/10.25819/ubsi/10126-
dc.identifier.urihttps://dspace.ub.uni-siegen.de/handle/ubsi/2215-
dc.identifier.urnurn:nbn:de:hbz:467-22150-
dc.language.isoende
dc.rightsNamensnennung 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.sourceEntropy, 24 (1), 2022 - https://doi.org/10.3390/e24010110de
dc.subject.ddc004 Informatikde
dc.subject.otherInformation theoretic privacyen
dc.subject.otherSecure function computationen
dc.subject.otherRemote sourceen
dc.subject.otherDistributed computationen
dc.subject.swbInformationssicherheitde
dc.subject.swbPrivatsphärede
dc.subject.swbPhysical unclonable functionde
dc.titleFunction computation under privacy, secrecy, distortion, and communication constraintsen
dc.typeArticlede
item.fulltextWith Fulltext-
ubsi.publication.affiliationDepartment Elektrotechnik - Informatikde
ubsi.source.issn1099-4300-
ubsi.source.issued2022de
ubsi.source.issuenumber1de
ubsi.source.linkhttps://www.mdpi.com/1099-4300/24/1/110/htmde
ubsi.source.pages21de
ubsi.source.publisherMultidisciplinary Digital Publishing Institute (MDPI)de
ubsi.source.titleEntropyde
ubsi.source.volume24de
ubsi.subject.ghbsTWPHde
ubsi.subject.ghbsTWHHde
Appears in Collections:Geförderte Open-Access-Publikationen
Files in This Item:
File Description SizeFormat
Onur_Günlü_function computation.pdf383.75 kBAdobe PDFThumbnail
View/Open

This item is protected by original copyright

Show simple item record

Page view(s)

156
checked on Apr 19, 2024

Download(s)

26
checked on Apr 19, 2024

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons