Function Computation Without Secure Links: Information and Leakage Rates

Research output: Contribution to journalArticlepeer-review

Abstract

Consider L users, who each hold private data, and one fusion center who must compute a function of the private data of the L users. To accomplish this task, each user may utilize a public and noiseless broadcast channel in a non-interactive manner. In this setting, and in the absence of any additional resources such as secure links, we study the optimal communication rates and minimum information leakages on the private user data that are achievable. Specifically, we study the information leakage of the user data at the fusion center (beyond the knowledge of the function output), as well as at predefined groups of colluding users who eavesdrop one another. We derive the capacity region when the user data is independent, and inner and outer regions for the capacity region when the user data is correlated.

Original languageEnglish (US)
Pages (from-to)9004-9018
Number of pages15
JournalIEEE Transactions on Information Theory
Volume71
Issue number11
DOIs
StatePublished - 2025

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Keywords

  • Function computation, multi-party computation, privacy, mutual information

Fingerprint

Dive into the research topics of 'Function Computation Without Secure Links: Information and Leakage Rates'. Together they form a unique fingerprint.

Cite this