Secure Source Coding With a Helper

被引:29
作者
Tandon, Ravi [1 ,2 ]
Ulukus, Sennur [3 ]
Ramchandran, Kannan [4 ]
机构
[1] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24060 USA
[2] Virginia Tech, Hume Ctr Natl Secur & Technol, Blacksburg, VA 24060 USA
[3] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[4] Univ Calif Berkeley, Wireless Fdn, Dept Elect Engn & Comp Sci, Berkeley, CA 94704 USA
基金
美国国家科学基金会;
关键词
Equivocation; helper problem; lossless source coding; SIDE INFORMATION;
D O I
10.1109/TIT.2012.2236973
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source X-n and wishes to transmit this source losslessly to Bob over a rate-limited link of capacity not exceeding R-x. A helper, say Helen, observes an i.i.d. correlated source Y-n and can transmit information to Bob over another link of capacity not exceeding R-y. A passive eavesdropper (say Eve) can observe the coded output of Alice, i.e., the link from Alice to Bob is public. The uncertainty about the source X-n at Eve (denoted by Delta) is measured by the conditional entropy H(X-n vertical bar J(x))/n, where J(x) is the coded output of Alice and n is the block length. We completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf binning of X-n with respect to the coded side information received at Bob is optimal. We next consider a modification of this model in which Alice also has access to the coded output of Helen. We call this model as the two-sided helper model. For the two-sided helper model, we characterize the rate-equivocation region. While the availability of side information at Alice does not reduce the rate of transmission from Alice, it significantly enhances the resulting equivocation at Eve. In particular, the resulting equivocation for the two-sided helper case is shown to be min(H(X), R-y), i.e., one bit from the two-sided helper provides one bit of uncertainty at Eve. From this result, we infer that Slepian-Wolf binning of X is suboptimal and one can further decrease the information leakage to the eavesdropper by utilizing the side information at Alice. We, finally, generalize both of these results to the case in which there is additional uncoded side information W-n available at Bob and characterize the rate-equivocation regions under the assumption that Y-n -> X-n -> W-n forms a Markov chain.
引用
收藏
页码:2178 / 2187
页数:10
相关论文
共 16 条
[1]   SOURCE CODING WITH SIDE INFORMATION AND A CONVERSE FOR DEGRADED BROADCAST CHANNELS [J].
AHLSWEDE, RF ;
KORNER, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1975, 21 (06) :629-637
[2]  
[Anonymous], 1981, Information Theory: Coding Theorems for Discrete Memoryless Systems
[3]  
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[4]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[5]  
Grokop L, 2005, 2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, P77
[6]   Lossless Compression with Security Constraints [J].
Guenduez, Deniz ;
Erkip, Elza ;
Poor, H. Vincent .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :111-115
[7]   Secure lossless compression with side information [J].
Gunduz, Deniz ;
Erkip, Elza ;
Poor, H. Vincent .
2008 IEEE INFORMATION THEORY WORKSHOP, 2008, :169-173
[8]  
Luh W, 2007, GLOB TELECOMM CONF, P44
[9]   On secure distributed source coding [J].
Prabhakaran, Vinod ;
Ramchandran, Kannan .
2007 IEEE INFORMATION THEORY WORKSHOP, VOLS 1 AND 2, 2007, :442-447
[10]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715