Secure computation of linear functions over linear discrete multiple-access wiretap channels

Mario Goldenbaum, Holger Boche, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

In this paper, a joint source-channel coding approach is taken to the problem of securely computing a function of distributed sources over a multiple-access wiretap channel that is linear with respect to a finite field. It is shown that if the joint source distribution fulfills certain conditions and the function to be computed matches the linear structure of the channel, secrecy comes for free in the sense that the fundamental limit (i.e., the secrecy computation-capacity) is achieved without the need for stochastic encoding. Furthermore, the legitimate receiver does not need any advantage over the eavesdropper, which is in stark contrast to standard physical-layer security results.

Original languageEnglish (US)
Title of host publicationConference Record of the 50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Pages1670-1674
Number of pages5
ISBN (Electronic)9781538639542
DOIs
StatePublished - Mar 1 2017
Event50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016 - Pacific Grove, United States
Duration: Nov 6 2016Nov 9 2016

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Other

Other50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
Country/TerritoryUnited States
CityPacific Grove
Period11/6/1611/9/16

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Networks and Communications

Keywords

  • Secure distributed computation
  • computation coding
  • multiple-access wiretap channel
  • physical-layer security

Fingerprint

Dive into the research topics of 'Secure computation of linear functions over linear discrete multiple-access wiretap channels'. Together they form a unique fingerprint.

Cite this