The Computational Wiretap Channel
© 2018 IEEE. We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some...
Main Authors: | D'Oliveira, Rafael G.L., Rouayheb, Salim El, Medard, Muriel |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2021
|
Online Access: | https://hdl.handle.net/1721.1/137893 |
Similar Items
-
The Computational Wiretap Channel
by: D'Oliveira, Rafael G.L., et al.
Published: (2021) -
Differential Privacy for Binary Functions via Randomized Graph Colorings
by: D'Oliveira, Rafael GL, et al.
Published: (2022) -
Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of (3 2)
by: D'Oliveira, Rafael GL, et al.
Published: (2022) -
Network Coding-Based Post-Quantum Cryptography
by: Cohen, Alejandro, et al.
Published: (2022) -
Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks
by: D'Oliveira, Rafael GL, et al.
Published: (2022)