首页> 外文期刊>IEEE Transactions on Information Theory >On Function Computation With Privacy and Secrecy Constraints
【24h】

On Function Computation With Privacy and Secrecy Constraints

机译:关于隐私和保密约束的功能计算

获取原文
获取原文并翻译 | 示例

摘要

In this paper, the problem of function computation with privacy and secrecy constraints is considered. The considered model consists of three legitimate nodes (i.e., two transmitters, Alice and Bob, and a fusion center that acts as the receiver) that observe correlated sources and are connected by noiseless public channels, and an eavesdropper Eve who has full access to the public channels and also has its own source observations. The fusion center would like to compute a function of the distributed sources within a prefixed distortion level under a certain distortion metric. To facilitate the function computation, Alice and Bob will send messages to the fusion center. Different from the existing setups in function computation, we assume that there is a privacy constraint on the sources at Alice and Bob. In particular, Alice and Bob would like to enable the fusion center to compute the function, but at same time, they do not want the fusion center to learn too much information about the source observations. We introduce a quantity to precisely measure the privacy leakage to the fusion center. In addition to this privacy constraint, we also have a secrecy constraint to Eve and use equivocation of sources to measure this quantity. Under this model, we study the tradeoffs among message rates, private information leakage, equivocation, and distortion. We first consider a scenario that has only one transmitter, i.e., the source at Bob is empty, and fully singleletter characterize the corresponding regions. Then, we consider the more general case and provide both outer and inner bounds on the corresponding regions.
机译:在本文中,考虑了具有隐私和保密约束的功能计算问题。考虑模型由三个合法节点(即,两个发射器,Alice和Bob,以及作为接收器的融合中心),其观察相关源并由无噪声公共渠道连接,并且可以完全访问的窃听器eve公共渠道也有自己的源观察。 Fusion Center希望计算在一定失真度量下的前缀失真级别内的分布式源的函数。为了便于函数计算,Alice和Bob将向融合中心发送消息。与功能计算中的现有设置不同,我们假设Alice和Bob的源上存在隐私约束。特别是,Alice和Bob希望能够计算融合中心来计算功能,但同时,它们不希望融合中心学习有关源观测的太多信息。我们介绍了一定数量的时间来精确地将隐私泄漏衡量到融合中心。除了本隐私约束之外,我们还有一个秘密约束,以便使用源的等级来衡量此数量。在此模型下,我们研究了消息率,私人信息泄漏,爆发和失真的权衡。我们首先考虑一个只有一个发射机的场景,即鲍勃处的源是空的,并且完全单片机表征了相应的区域。然后,我们考虑更普遍的情况并在相应的区域上提供外部和内部边界。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号