Loading…
On the Capacity of Secure K-User Product Computation Over a Quantum MAC
Inspired by recent work by Christensen and Popovski on secure 2-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to K users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) sc...
Saved in:
Published in: | IEEE communications letters 2023-10, Vol.27 (10), p.2598-2602 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Inspired by recent work by Christensen and Popovski on secure 2-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to K users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo- d ( d\geq 2 ) secure K -sum computation is shown to be 2/K computations/qudit, generalizing a result of Nishimura and Kawachi beyond binary, and improving upon it for odd K . |
---|---|
ISSN: | 1089-7798 1558-2558 |
DOI: | 10.1109/LCOMM.2023.3311368 |