Private Remote Sources for Secure Multi-Function Computation

We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also secrecy and privacy. Specifically, 1) the function computed should remain secret from an eavesdropper observing the public communication and correlated observations, measured in terms of the information leaked about the arguments of the function, to ensure secrecy regardless of the exact function used; 2) the remote source should remain private from the eavesdropper and the fusion center, measured in terms of the information leaked about the remote source itself. We derive the exact rate regions for lossless and lossy single-function computation and illustrate the lossy single-function computation rate region for an information bottleneck example, in which the optimal auxiliary random variables are characterized for binary-input symmetric-output channels. We extend This work has been supported in part by the German Research Foundation (DFG) under the Grant SCHA 1944/9-1 and in part by the National Science Foundation (NSF) under the Grant CCF 1955401. Parts of this work are accepted for presentation at the IEEE International Symposium on Information Theory 2021 [1]. O. Günlü and R. F. Schaefer are with the Chair of Communications Engineering and Security, University of Siegen, 57076 Siegen, Germany (email: {onur.guenlue, rafael.schaefer}@uni-siegen.de). M. Bloch is with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332 (email: matthieu.bloch@ece.gatech.edu).

[1]  Onur Günlü Key Agreement with Physical Unclonable Functions and Biometric Identifiers , 2019 .

[2]  Naftali Tishby,et al.  The information bottleneck method , 2000, ArXiv.

[3]  Hans S. Witsenhausen,et al.  A conditional entropy bound for a pair of discrete random variables , 1975, IEEE Trans. Inf. Theory.

[4]  Giuseppe Caire,et al.  Controllable Identifier Measurements for Private Authentication With Secret Keys , 2018, IEEE Transactions on Information Forensics and Security.

[5]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[6]  Himanshu Tyagi,et al.  When Is a Function Securely Computable? , 2010, IEEE Transactions on Information Theory.

[7]  H. Vincent Poor,et al.  An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.

[8]  Onur Günlü,et al.  Private Authentication with Physical Identifiers Through Broadcast Channel Measurements , 2019, 2019 IEEE Information Theory Workshop (ITW).

[9]  Prakash Ishwar,et al.  Some Results on Distributed Source Coding for Interactive Function Computation , 2011, IEEE Transactions on Information Theory.

[10]  Aaron D. Wyner,et al.  The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.

[11]  Amin Gohari,et al.  Achievability Proof via Output Statistics of Random Binning , 2012, IEEE Transactions on Information Theory.

[12]  Aslan Tchamkerten,et al.  Computing a function of correlated Sources: A rate region , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[13]  V. Prabhakaran,et al.  On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.

[14]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[15]  H. Vincent Poor,et al.  On secure computation over the binary modulo-2 adder multiple-access wiretap channel , 2016, 2016 IEEE Information Theory Workshop (ITW).

[16]  Himanshu Tyagi,et al.  A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing , 2014, IACR Cryptol. ePrint Arch..

[17]  Steven P. Weber,et al.  Overhead Performance Tradeoffs—A Resource Allocation Perspective , 2014, IEEE Transactions on Information Theory.

[18]  Lifeng Lai,et al.  On Function Computation With Privacy and Secrecy Constraints , 2019, IEEE Transactions on Information Theory.

[19]  Onur Günlü,et al.  Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers , 2016, IEEE Transactions on Information Forensics and Security.

[20]  Matthieu R. Bloch,et al.  Secure Multi-Function Computation with Private Remote Sources , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).

[21]  Alon Orlitsky,et al.  Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[22]  Onur Gunlu,et al.  Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise , 2020, IEEE Transactions on Information Forensics and Security.

[23]  Vinod M. Prabhakaran,et al.  Secure Computation to Hide Functions of Inputs , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[24]  Maciej Skorski,et al.  Privacy and secrecy with multiple measurements of physical and biometric identifiers , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).

[25]  Michael Gastpar,et al.  Computation Over Multiple-Access Channels , 2007, IEEE Transactions on Information Theory.

[26]  Himanshu Tyagi,et al.  Converses For Secret Key Agreement and Secure Computing , 2014, IEEE Transactions on Information Theory.

[27]  Sreeram Kannan,et al.  Multi-Session Function Computation and Multicasting in Undirected Graphs , 2013, IEEE Journal on Selected Areas in Communications.

[28]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[29]  Filip De Turck,et al.  Network Function Virtualization: State-of-the-Art and Research Challenges , 2015, IEEE Communications Surveys & Tutorials.

[30]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[31]  Panganamala Ramana Kumar,et al.  Optimal Function Computation in Directed and Undirected Graphs , 2011, IEEE Transactions on Information Theory.

[32]  Joseph M. Renes,et al.  Noisy Channel Coding via Privacy Amplification and Information Reconciliation , 2010, IEEE Transactions on Information Theory.

[33]  Onur Günlü,et al.  An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions , 2020, Entropy.

[34]  Shlomo Shamai,et al.  Extension of an entropy property for binary input memoryless symmetric channels , 1989, IEEE Trans. Inf. Theory.

[35]  Onur Günlü,et al.  Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems , 2017, IEEE Transactions on Information Forensics and Security.

[36]  H. Vincent Poor,et al.  Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).

[37]  Matthieu R. Bloch,et al.  Physical Layer Security , 2020, Encyclopedia of Wireless Networks.

[38]  Himanshu Tyagi Distributed Function Computation with Confidentiality , 2013, IEEE Journal on Selected Areas in Communications.

[39]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[40]  Stark C. Draper,et al.  A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.

[41]  H. Vincent Poor,et al.  Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.

[42]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.