When is a Function Securely Computable?
01 October 2011
A subset of a set of terminals that observe correlated signals seek to compute a function of the signals using public communication. It is required that the value of the function be concealed from an eavesdropper with access to the communication. We show that the function is securely computable if and only if its entropy is less than the capacity of a new secrecy generation model, for which a single-letter characterization is provided. Index Terms Aided secret key, balanced coloring lemma, function computation, maximum common function, omniscience, secret key capacity, secure computability.