{"id":"https://openalex.org/W3169278459","doi":"https://doi.org/10.1109/isit45174.2021.9518019","title":"Secure Multi-Function Computation with Private Remote Sources","display_name":"Secure Multi-Function Computation with Private Remote Sources","publication_year":2021,"publication_date":"2021-07-12","ids":{"openalex":"https://openalex.org/W3169278459","doi":"https://doi.org/10.1109/isit45174.2021.9518019","mag":"3169278459"},"language":"en","primary_location":{"id":"doi:10.1109/isit45174.2021.9518019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2106.09485","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016620064","display_name":"Onur G\u00fcnl\u00fc","orcid":"https://orcid.org/0000-0002-0313-7788"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Onur G\u00fcnl\u00fc","raw_affiliation_strings":["University of Siegen,Chair of Communications Engineering and Security"],"affiliations":[{"raw_affiliation_string":"University of Siegen,Chair of Communications Engineering and Security","institution_ids":["https://openalex.org/I206895457"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055689993","display_name":"Matthieu R. Bloch","orcid":"https://orcid.org/0000-0001-9315-9050"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthieu Bloch","raw_affiliation_strings":["School of Electrical and Computer Engineering, Georgia Institute of Technology","[School of Electrical and Computer Engineering Georgia Institute of Technology]"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Georgia Institute of Technology","institution_ids":["https://openalex.org/I130701444"]},{"raw_affiliation_string":"[School of Electrical and Computer Engineering Georgia Institute of Technology]","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038203207","display_name":"Rafael F. Schaefer","orcid":"https://orcid.org/0000-0002-1702-9075"},"institutions":[{"id":"https://openalex.org/I206895457","display_name":"University of Siegen","ror":"https://ror.org/02azyry73","country_code":"DE","type":"education","lineage":["https://openalex.org/I206895457"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rafael F. Schaefer","raw_affiliation_strings":["University of Siegen,Chair of Communications Engineering and Security"],"affiliations":[{"raw_affiliation_string":"University of Siegen,Chair of Communications Engineering and Security","institution_ids":["https://openalex.org/I206895457"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016620064"],"corresponding_institution_ids":["https://openalex.org/I206895457"],"apc_list":null,"apc_paid":null,"fwci":0.3048,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.55780899,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1403","last_page":"1408"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.8456236124038696},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.7574300765991211},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7045168280601501},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6555664539337158},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5939531326293945},{"id":"https://openalex.org/keywords/fusion-center","display_name":"Fusion center","score":0.5809659957885742},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.5047017335891724},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.49768736958503723},{"id":"https://openalex.org/keywords/information-bottleneck-method","display_name":"Information bottleneck method","score":0.46420225501060486},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.4502420723438263},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.44253838062286377},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39868053793907166},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3269573450088501},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.23468366265296936},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17700880765914917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12418094277381897},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10545271635055542},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.08454805612564087},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08346354961395264},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.08037498593330383}],"concepts":[{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.8456236124038696},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.7574300765991211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7045168280601501},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6555664539337158},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5939531326293945},{"id":"https://openalex.org/C2781234732","wikidata":"https://www.wikidata.org/wiki/Q943505","display_name":"Fusion center","level":4,"score":0.5809659957885742},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.5047017335891724},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.49768736958503723},{"id":"https://openalex.org/C60008888","wikidata":"https://www.wikidata.org/wiki/Q6031013","display_name":"Information bottleneck method","level":3,"score":0.46420225501060486},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.4502420723438263},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.44253838062286377},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39868053793907166},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3269573450088501},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.23468366265296936},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17700880765914917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12418094277381897},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10545271635055542},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.08454805612564087},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08346354961395264},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.08037498593330383},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/isit45174.2021.9518019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit45174.2021.9518019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2106.09485","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2106.09485","pdf_url":"https://arxiv.org/pdf/2106.09485","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3169278459","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/2106.09485v2","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2106.09485","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2106.09485","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2106.09485","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2106.09485","pdf_url":"https://arxiv.org/pdf/2106.09485","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G379016537","display_name":null,"funder_award_id":"SCHA 1944/9-1","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G7099879521","display_name":null,"funder_award_id":"CCF 1955401","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3169278459.pdf","grobid_xml":"https://content.openalex.org/works/W3169278459.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W364494856","https://openalex.org/W1494099594","https://openalex.org/W1546330602","https://openalex.org/W1686946872","https://openalex.org/W2005007104","https://openalex.org/W2011261271","https://openalex.org/W2027340571","https://openalex.org/W2032001704","https://openalex.org/W2057124070","https://openalex.org/W2070395973","https://openalex.org/W2088492763","https://openalex.org/W2092422002","https://openalex.org/W2099213070","https://openalex.org/W2119985618","https://openalex.org/W2128765501","https://openalex.org/W2140227342","https://openalex.org/W2143121893","https://openalex.org/W2144387589","https://openalex.org/W2145000276","https://openalex.org/W2150412388","https://openalex.org/W2152625085","https://openalex.org/W2154175667","https://openalex.org/W2159351168","https://openalex.org/W2161439939","https://openalex.org/W2164014406","https://openalex.org/W2164651000","https://openalex.org/W2178986096","https://openalex.org/W2183321856","https://openalex.org/W2260783129","https://openalex.org/W2309021504","https://openalex.org/W2791184774","https://openalex.org/W2887900476","https://openalex.org/W2910044495","https://openalex.org/W2953001817","https://openalex.org/W2955388057","https://openalex.org/W2963249535","https://openalex.org/W3013287444","https://openalex.org/W3080533967","https://openalex.org/W3091927229","https://openalex.org/W3102526553","https://openalex.org/W3102586542","https://openalex.org/W3104710021","https://openalex.org/W3105487184","https://openalex.org/W3116117152","https://openalex.org/W3141585064","https://openalex.org/W3141610964","https://openalex.org/W4300188436","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W3198431872","https://openalex.org/W2953001817","https://openalex.org/W3102586542","https://openalex.org/W2030835833","https://openalex.org/W2593004937","https://openalex.org/W3091927229","https://openalex.org/W2754288224","https://openalex.org/W2098812289","https://openalex.org/W2117264259","https://openalex.org/W2245387346","https://openalex.org/W2100928229","https://openalex.org/W2783183435","https://openalex.org/W2790102446","https://openalex.org/W2887481393","https://openalex.org/W2951681615","https://openalex.org/W2995089768","https://openalex.org/W2129826397","https://openalex.org/W2921575958","https://openalex.org/W2013971406","https://openalex.org/W1963874403"],"abstract_inverted_index":{"We":[0,110,150],"consider":[1],"a":[2,14,21,27],"distributed":[3,34],"function":[4,22,35,80,108],"computation":[5,19,36,121,127],"problem":[6],"in":[7,68,89,135,167,180],"which":[8,136,168],"parties":[9],"observing":[10],"noisy":[11],"versions":[12],"of":[13,20,23,70,91,98,105],"remote":[15,55,76],"source":[16,56],"facilitate":[17],"the":[18,54,64,71,75,79,86,92,96,99,106,112,124,137,152,175,181],"their":[24],"observations":[25],"at":[26],"fusion":[28,65],"center":[29],"through":[30],"public":[31],"communication.":[32],"The":[33],"is":[37],"subject":[38],"to":[39,101,154],"constraints,":[40,166],"including":[41],"not":[42],"only":[43,179],"reliability":[44],"and":[45,50,63,118,122,156,164,171],"storage":[46],"but":[47],"also":[48],"privacy":[49,165],"secrecy.":[51],"Specifically,":[52],"1)":[53],"should":[57,82],"remain":[58,83],"private":[59],"from":[60,85],"an":[61,131],"eavesdropper":[62],"center,":[66],"measured":[67,88],"terms":[69,90],"information":[72,93,132],"leaked":[73,94],"about":[74,95],"source;":[77],"2)":[78],"computed":[81],"secret":[84],"eavesdropper,":[87],"arguments":[97],"function,":[100],"ensure":[102],"secrecy":[103,163],"regardless":[104],"exact":[107,113],"used.":[109],"derive":[111],"rate":[114,128,176],"regions":[115,177],"for":[116,130,144,174],"lossless":[117,155],"lossy":[119,125,157],"single-function":[120,126],"illustrate":[123],"region":[129],"bottleneck":[133],"example,":[134],"optimal":[138],"auxiliary":[139],"random":[140],"variables":[141],"are":[142,186],"characterized":[143],"binary":[145],"input":[146],"symmetric":[147],"output":[148],"channels.":[149],"extend":[151],"approach":[153],"asynchronous":[158],"multiple-function":[159],"computations":[160],"with":[161],"joint":[162],"case":[169],"inner":[170],"outer":[172],"bounds":[173],"differing":[178],"Markov":[182],"chain":[183],"conditions":[184],"imposed":[185],"characterized.":[187]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2022-07-25T00:00:00"}
