The Computational Wiretap Channel

© 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some...

Full description

Bibliographic Details
Main Authors: D'Oliveira, Rafael G.L., Rouayheb, Salim El, Medard, Muriel
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE) 2021
Online Access:https://hdl.handle.net/1721.1/137893
_version_ 1826190404397039616
author D'Oliveira, Rafael G.L.
Rouayheb, Salim El
Medard, Muriel
author2 Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
author_facet Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
D'Oliveira, Rafael G.L.
Rouayheb, Salim El
Medard, Muriel
author_sort D'Oliveira, Rafael G.L.
collection MIT
description © 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, to a classic Wyner wiretap channel.
first_indexed 2024-09-23T08:39:44Z
format Article
id mit-1721.1/137893
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T08:39:44Z
publishDate 2021
publisher Institute of Electrical and Electronics Engineers (IEEE)
record_format dspace
spelling mit-1721.1/1378932021-11-10T03:46:12Z The Computational Wiretap Channel D'Oliveira, Rafael G.L. Rouayheb, Salim El Medard, Muriel Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science © 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, to a classic Wyner wiretap channel. 2021-11-09T14:52:10Z 2021-11-09T14:52:10Z 2018-10 2019-06-21T12:53:53Z Article http://purl.org/eprint/type/ConferencePaper https://hdl.handle.net/1721.1/137893 D'Oliveira, Rafael G.L., Rouayheb, Salim El and Medard, Muriel. 2018. "The Computational Wiretap Channel." en 10.1109/allerton.2018.8635979 Creative Commons Attribution-Noncommercial-Share Alike http://creativecommons.org/licenses/by-nc-sa/4.0/ application/pdf Institute of Electrical and Electronics Engineers (IEEE) arXiv
spellingShingle D'Oliveira, Rafael G.L.
Rouayheb, Salim El
Medard, Muriel
The Computational Wiretap Channel
title The Computational Wiretap Channel
title_full The Computational Wiretap Channel
title_fullStr The Computational Wiretap Channel
title_full_unstemmed The Computational Wiretap Channel
title_short The Computational Wiretap Channel
title_sort computational wiretap channel
url https://hdl.handle.net/1721.1/137893
work_keys_str_mv AT doliveirarafaelgl thecomputationalwiretapchannel
AT rouayhebsalimel thecomputationalwiretapchannel
AT medardmuriel thecomputationalwiretapchannel
AT doliveirarafaelgl computationalwiretapchannel
AT rouayhebsalimel computationalwiretapchannel
AT medardmuriel computationalwiretapchannel