Private Key and Decoder Side Information for Secure and Private Source Coding †

Onur Günlü, Rafael F. Schaefer, Holger Boche, Harold Vincent Poor

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (Formula presented.) all terminals noncausally observe a noisy measurement of the remote source; (Formula presented.) a private key is available to all legitimate terminals; (Formula presented.) the public communication link between the encoder and decoder is rate-limited; and (Formula presented.) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels.

Original languageEnglish (US)
Article number1716
JournalEntropy
Volume24
Issue number12
DOIs
StatePublished - Dec 2022
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Mathematical Physics
  • Physics and Astronomy (miscellaneous)
  • General Physics and Astronomy
  • Electrical and Electronic Engineering

Keywords

  • information theoretic security
  • private key
  • remote source
  • secure source coding
  • side information

Fingerprint

Dive into the research topics of 'Private Key and Decoder Side Information for Secure and Private Source Coding †'. Together they form a unique fingerprint.

Cite this