The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed sequences; 2) the information leakage to a fusion center with respect to the remote source is considered as a new privacy leakage metric; 3) the function computed is allowed to be a distorted version of the target function, which allows to reduce the storage rate as compared to a reliable function computation scenario in addition to reducing secrecy and privacy leakages; 4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, simplified lossless and lossy rate region bounds are established, and one region is evaluated as an example scenario.
翻译:可靠的功能计算问题通过对遥控源施加隐私、保密和储存限制而扩大,该远程源的测量为多方所观察到的噪音测量,对传统功能计算问题的主要补充包括:(1) 隐私渗漏到窃听器中,是按遥控源而不是传输终端的观测序列测量的;(2) 信息渗漏到远程源的聚合中心,被视为一种新的隐私渗漏指标;(3) 允许对目标功能作扭曲的描述,从而可以降低存储率,而与可靠的功能计算假设相比,并减少保密和隐私渗漏;(4) 使用两种传送节点观测来计算功能; 以无损和亏损的单功能计算方法计算比率区域的内外部界限,有两个传输节点,在文献中恢复了先前的结果; 对于特殊案例,包括不可忽略和部分不可忽略的功能,以及退化的测量渠道,建立了简化的无损率和损失率区域界限,并将一个区域作为实例评估。