The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include 1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals' observed sequences; 2) the information leakage to a fusion center with respect to the remote source is considered as a new privacy leakage metric; 3) the function computed is allowed to be a distorted version of the target function, which allows to reduce the storage rate as compared to a reliable function computation scenario in addition to reducing secrecy and privacy leakages; 4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases that include invertible and partially-invertible functions, and degraded measurement channels, exact lossless and lossy rate regions are characterized, and one exact region is evaluated for an example scenario.
翻译:可靠的功能计算问题通过对遥控源施加隐私、保密和储存限制而扩大,该远程源的测量为多方所观察到的噪音测量,对传统功能计算问题的主要补充包括:(1) 隐私渗漏到窃听器中,是按遥控源而不是传输终端的观测序列测量的;(2) 信息渗漏到远程源的聚合中心,被视为一种新的隐私渗漏指标;(3) 允许对目标功能作扭曲的描述,这样可以降低存储率,而比可靠的功能计算假设值要低;(4) 使用两种传送节点观测来计算功能; 以无损和损失的单一功率计算率区域的内外部界限得出,用两个传输节点来恢复文献中以前的结果; 对于包括不可忽略和部分不可忽略功能的特殊案例,以及退化的测量渠道、准确无损和损失率区域,对一个准确的区域进行了评估。