Security

When is a Function Securely Computable?

Download Now Free registration required

Executive Summary

A subset of a set of terminals that observe correlated signals seek to compute a given function of the signals using public communication. It is required that the value of the function be kept secret from an eavesdropper with access to the communication. The authors show that the function is securely computable if and only if its entropy is less than the "Aided secret key" capacity of an associated secrecy generation model, for which a single-letter characterization is provided.

  • Format: PDF
  • Size: 271.66 KB