Computer Science – Information Theory
Scientific paper
2012-04-11
Computer Science
Information Theory
Submitted to IEEE JSAC: In-Network Computation: Exploring the Fundamental Limits
Scientific paper
A set of terminals observe correlated data and seek to compute functions of the data using interactive public communication. At the same time, it is required that the value of a private function of the data remains concealed from an eavesdropper observing this communication. In general, the private function and the functions computed by the nodes can be all different. We show that a class of functions are securely computable if and only if the conditional entropy of data given the value of private function is greater than the least rate of interactive communication required for a related multiterminal source-coding task. A single-letter formula is provided for this rate in special cases.
No associations
LandOfFree
Distributed Function Computation Under Privacy Constraints does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Distributed Function Computation Under Privacy Constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Distributed Function Computation Under Privacy Constraints will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-717225