The Computational Wiretap Channel
© 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: | https://hdl.handle.net/1721.1/137893 |
_version_ | 1826190404397039616 |
---|---|
author | D'Oliveira, Rafael G.L. Rouayheb, Salim El Medard, Muriel |
author2 | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
author_facet | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science D'Oliveira, Rafael G.L. Rouayheb, Salim El Medard, Muriel |
author_sort | D'Oliveira, Rafael G.L. |
collection | MIT |
description | © 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, to a classic Wyner wiretap channel. |
first_indexed | 2024-09-23T08:39:44Z |
format | Article |
id | mit-1721.1/137893 |
institution | Massachusetts Institute of Technology |
language | English |
last_indexed | 2024-09-23T08:39:44Z |
publishDate | 2021 |
publisher | Institute of Electrical and Electronics Engineers (IEEE) |
record_format | dspace |
spelling | mit-1721.1/1378932021-11-10T03:46:12Z The Computational Wiretap Channel D'Oliveira, Rafael G.L. Rouayheb, Salim El Medard, Muriel Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science © 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, to a classic Wyner wiretap channel. 2021-11-09T14:52:10Z 2021-11-09T14:52:10Z 2018-10 2019-06-21T12:53:53Z Article http://purl.org/eprint/type/ConferencePaper https://hdl.handle.net/1721.1/137893 D'Oliveira, Rafael G.L., Rouayheb, Salim El and Medard, Muriel. 2018. "The Computational Wiretap Channel." en 10.1109/allerton.2018.8635979 Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) arXiv |
spellingShingle | D'Oliveira, Rafael G.L. Rouayheb, Salim El Medard, Muriel The Computational Wiretap Channel |
title | The Computational Wiretap Channel |
title_full | The Computational Wiretap Channel |
title_fullStr | The Computational Wiretap Channel |
title_full_unstemmed | The Computational Wiretap Channel |
title_short | The Computational Wiretap Channel |
title_sort | computational wiretap channel |
url | https://hdl.handle.net/1721.1/137893 |
work_keys_str_mv | AT doliveirarafaelgl thecomputationalwiretapchannel AT rouayhebsalimel thecomputationalwiretapchannel AT medardmuriel thecomputationalwiretapchannel AT doliveirarafaelgl computationalwiretapchannel AT rouayhebsalimel computationalwiretapchannel AT medardmuriel computationalwiretapchannel |