Secure Source Coding With Action-Dependent Side Information

被引:18
作者
Kittichokechai, Kittipong [1 ]
Oechtering, Tobias J. [1 ]
Skoglund, Mikael [1 ]
Chia, Yeow-Khiang [2 ]
机构
[1] KTH Royal Inst Technol, ACCESS Linnaeus Ctr, Sch Elect Engn, S-10044 Stockholm, Sweden
[2] Inst Infocomm Res, Singapore 138632, Singapore
基金
瑞典研究理事会;
关键词
Action; lossy source coding; security; privacy; rate-distortion-leakage tradeoff; RATE-DISTORTION FUNCTION; SECRET KEY AGREEMENT; WIRETAP CHANNEL; CONFIDENTIAL MESSAGES; STATE INFORMATION; CAPACITY; COOPERATION; RECEIVERS; DECODER; SYSTEMS;
D O I
10.1109/TIT.2015.2487448
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problems of secure lossy source coding with side information in the presence of a passive eavesdropper who has access to the source description. The encoder wishes to compress the source sequence in order to satisfy a distortion criterion at the decoder, while revealing only limited knowledge about the source to the eavesdropper. The side information available to the encoder, the legitimate decoder, or the eavesdropper can be influenced by a cost-constrained action sequence. Three different settings are studied. In the first two settings, we are interested in understanding the influence of the action sequence on the rate-distortion-leakage tradeoff where the action is taken either by the decoder or by the encoder to influence side information at the decoder and eavesdropper. Next, we consider a setting where common action-dependent side information is available securely to both encoder and decoder, and thus can be used for secret key generation. We characterize the optimal rate-distortion-cost-leakage region or the corresponding inner bounds for a discrete memoryless source for above settings. The results are useful in characterizing fundamental limits for example in secure sensor networking and future cyber physical systems.
引用
收藏
页码:6444 / 6464
页数:21
相关论文
共 58 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]   Information Embedding on Actions [J].
Ahmadi, Behzad ;
Asnani, Himanshu ;
Simeone, Osvaldo ;
Permuter, Haim H. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (11) :6902-6916
[3]  
Ahmadi B, 2013, IEEE INT SYMP INFO, P2159, DOI 10.1109/ISIT.2013.6620608
[4]   Distributed and Cascade Lossy Source Coding With a Side Information "Vending Machine" [J].
Ahmadi, Behzad ;
Simeone, Osvaldo .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (10) :6807-6819
[5]  
[Anonymous], 2011, Information theory: Coding theorems for discrete memoryless systems
[6]  
[Anonymous], 2011, PHYS LAYER SECURITY, DOI DOI 10.1017/CBO9780511977985
[7]   Probing Capacity [J].
Asnani, Himanshu ;
Permuter, Haim ;
Weissman, Tsachy .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (11) :7317-7332
[8]   Wiretap channel with side information [J].
Chen, Yanling ;
Vinck, A. J. Han .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (01) :395-402
[9]  
Chia YK, 2013, IEEE INT SYMP INFO, P2204, DOI 10.1109/ISIT.2013.6620617
[10]   Multiterminal Source Coding With Action-Dependent Side Information [J].
Chia, Yeow-Khiang ;
Asnani, Himanshu ;
Weissman, Tsachy .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (06) :3653-3667