Private Key and Decoder Side Information for Secure and Private Source Coding

被引:2
作者
Gunlu, Onur [1 ]
Schaefer, Rafael F. [2 ,3 ]
Boche, Holger [4 ,5 ,6 ,7 ]
Poor, Harold Vincent [8 ]
机构
[1] Linkoping Univ, Informat Coding Div, S-58183 Linkoping, Sweden
[2] Tech Univ Dresden, Chair Informat Theory & Machine Learning, D-01062 Dresden, Germany
[3] Tech Univ Dresden, BMBF Res Hub 6G Life, D-01062 Dresden, Germany
[4] Tech Univ Munich, TUM Sch Computat Informat & Technol, Lehrstuhl Theoret Informat Tech, D-80333 Munich, Germany
[5] Ruhr Univ Bochum, CASA Cyber Secur Age Large Scale Adversaries Exze, D-44780 Bochum, Germany
[6] Tech Univ Munich, BMBF Res Hub 6G Life, D-80333 Munich, Germany
[7] Munich Ctr Quantum Sci & Technol MCQST, Schellingstr 4, D-80799 Munich, Germany
[8] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
information theoretic security; secure source coding; remote source; private key; side information; AGREEMENT; RANDOMNESS; SECRECY; ENTROPY;
D O I
10.3390/e24121716
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (1) all terminals noncausally observe a noisy measurement of the remote source; (2) a private key is available to all legitimate terminals; (3) the public communication link between the encoder and decoder is rate-limited; and (4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels.
引用
收藏
页数:22
相关论文
共 53 条
[41]   NOISELESS CODING OF CORRELATED INFORMATION SOURCES [J].
SLEPIAN, D ;
WOLF, JK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1973, 19 (04) :471-480
[42]   Secure Source Coding With a Helper [J].
Tandon, Ravi ;
Ulukus, Sennur ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (04) :2178-2187
[43]   On Function Computation With Privacy and Secrecy Constraints [J].
Tu, Wenwen ;
Lai, Lifeng .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) :6716-6733
[44]   Secure Multiterminal Source Coding With Side Information at the Eavesdropper [J].
Villard, Joffrey ;
Piantanida, Pablo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (06) :3668-3692
[45]   Secret Key Agreement from Correlated Gaussian,Sources by Rate Limited Public Communication [J].
Watanabe, Shun ;
Oohama, Yasutada .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) :1976-1983
[46]  
Willems Frans M. J., 2009, 2009 Information Theory and Applications Workshop (ITA), P372, DOI 10.1109/ITA.2009.5044973
[47]   RATE-DISTORTION FUNCTION FOR SOURCE CODING WITH SIDE INFORMATION AT DECODER [J].
WYNER, AD ;
ZIV, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (01) :1-10
[48]   THEOREM ON ENTROPY OF CERTAIN BINARY SEQUENCES AND APPLICATIONS .1. [J].
WYNER, AD ;
ZIV, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1973, 19 (06) :769-772
[49]  
Yachongka V, 2022, Arxiv, DOI arXiv:2202.10018
[50]   CODING THEOREMS FOR SHANNON CIPHER SYSTEM WITH CORRELATED SOURCE OUTPUTS, AND COMMON INFORMATION [J].
YAMAMOTO, H .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) :85-95