Private Remote Sources for Secure Multi-Function Computation
暂无分享,去创建一个
[1] Onur Günlü. Key Agreement with Physical Unclonable Functions and Biometric Identifiers , 2019 .
[2] Naftali Tishby,et al. The information bottleneck method , 2000, ArXiv.
[3] Hans S. Witsenhausen,et al. A conditional entropy bound for a pair of discrete random variables , 1975, IEEE Trans. Inf. Theory.
[4] Giuseppe Caire,et al. Controllable Identifier Measurements for Private Authentication With Secret Keys , 2018, IEEE Transactions on Information Forensics and Security.
[5] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[6] Himanshu Tyagi,et al. When Is a Function Securely Computable? , 2010, IEEE Transactions on Information Theory.
[7] H. Vincent Poor,et al. An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.
[8] Onur Günlü,et al. Private Authentication with Physical Identifiers Through Broadcast Channel Measurements , 2019, 2019 IEEE Information Theory Workshop (ITW).
[9] Prakash Ishwar,et al. Some Results on Distributed Source Coding for Interactive Function Computation , 2011, IEEE Transactions on Information Theory.
[10] Aaron D. Wyner,et al. The rate-distortion function for source coding with side information at the decoder , 1976, IEEE Trans. Inf. Theory.
[11] Amin Gohari,et al. Achievability Proof via Output Statistics of Random Binning , 2012, IEEE Transactions on Information Theory.
[12] Aslan Tchamkerten,et al. Computing a function of correlated Sources: A rate region , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[13] V. Prabhakaran,et al. On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.
[14] Thomas M. Cover,et al. Elements of information theory (2. ed.) , 2006 .
[15] H. Vincent Poor,et al. On secure computation over the binary modulo-2 adder multiple-access wiretap channel , 2016, 2016 IEEE Information Theory Workshop (ITW).
[16] Himanshu Tyagi,et al. A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing , 2014, IACR Cryptol. ePrint Arch..
[17] Steven P. Weber,et al. Overhead Performance Tradeoffs—A Resource Allocation Perspective , 2014, IEEE Transactions on Information Theory.
[18] Lifeng Lai,et al. On Function Computation With Privacy and Secrecy Constraints , 2019, IEEE Transactions on Information Theory.
[19] Onur Günlü,et al. Privacy, Secrecy, and Storage With Multiple Noisy Measurements of Identifiers , 2016, IEEE Transactions on Information Forensics and Security.
[20] Matthieu R. Bloch,et al. Secure Multi-Function Computation with Private Remote Sources , 2021, 2021 IEEE International Symposium on Information Theory (ISIT).
[21] Alon Orlitsky,et al. Coding for computing , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[22] Onur Gunlu,et al. Multi-Entity and Multi-Enrollment Key Agreement With Correlated Noise , 2020, IEEE Transactions on Information Forensics and Security.
[23] Vinod M. Prabhakaran,et al. Secure Computation to Hide Functions of Inputs , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).
[24] Maciej Skorski,et al. Privacy and secrecy with multiple measurements of physical and biometric identifiers , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[25] Michael Gastpar,et al. Computation Over Multiple-Access Channels , 2007, IEEE Transactions on Information Theory.
[26] Himanshu Tyagi,et al. Converses For Secret Key Agreement and Secure Computing , 2014, IEEE Transactions on Information Theory.
[27] Sreeram Kannan,et al. Multi-Session Function Computation and Multicasting in Undirected Graphs , 2013, IEEE Journal on Selected Areas in Communications.
[28] Robert G. Gallager,et al. Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.
[29] Filip De Turck,et al. Network Function Virtualization: State-of-the-Art and Research Challenges , 2015, IEEE Communications Surveys & Tutorials.
[30] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[31] Panganamala Ramana Kumar,et al. Optimal Function Computation in Directed and Undirected Graphs , 2011, IEEE Transactions on Information Theory.
[32] Joseph M. Renes,et al. Noisy Channel Coding via Privacy Amplification and Information Reconciliation , 2010, IEEE Transactions on Information Theory.
[33] Onur Günlü,et al. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions , 2020, Entropy.
[34] Shlomo Shamai,et al. Extension of an entropy property for binary input memoryless symmetric channels , 1989, IEEE Trans. Inf. Theory.
[35] Onur Günlü,et al. Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems , 2017, IEEE Transactions on Information Forensics and Security.
[36] H. Vincent Poor,et al. Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication , 2020, 2020 IEEE International Symposium on Information Theory (ISIT).
[37] Matthieu R. Bloch,et al. Physical Layer Security , 2020, Encyclopedia of Wireless Networks.
[38] Himanshu Tyagi. Distributed Function Computation with Confidentiality , 2013, IEEE Journal on Selected Areas in Communications.
[39] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[40] Stark C. Draper,et al. A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.
[41] H. Vincent Poor,et al. Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.
[42] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.