Private Key and Decoder Side Information for Secure and Private Source Coding †

Onur Günlü, Rafael F. Schaefer, Holger Boche, Harold Vincent Poor

Research output: Contribution to journalArticlepeer-review

2 Scopus citations


We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (Formula presented.) all terminals noncausally observe a noisy measurement of the remote source; (Formula presented.) a private key is available to all legitimate terminals; (Formula presented.) the public communication link between the encoder and decoder is rate-limited; and (Formula presented.) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels.

Original languageEnglish (US)
Article number1716
Issue number12
StatePublished - Dec 2022
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Electrical and Electronic Engineering
  • General Physics and Astronomy
  • Mathematical Physics
  • Physics and Astronomy (miscellaneous)


  • information theoretic security
  • private key
  • remote source
  • secure source coding
  • side information


Dive into the research topics of 'Private Key and Decoder Side Information for Secure and Private Source Coding †'. Together they form a unique fingerprint.

Cite this