Rate-distortion theory for secrecy systems

Curt Schieler, Paul Cuff

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

In this work, secrecy in communication systems is measured by the distortion incurred by the worst-case adversary. The transmitter and receiver share secret key, which they use to encrypt communication and cause distortion at an adversary. In our model, we assume that an adversary not only intercepts the communication between the transmitter and receiver, but also may have access to noisy observations of the system. For example, the adversary may have causal access to a signal that is correlated with the source sequence or with the output of the receiver. Our main contribution is the solution of the optimal tradeoff among communication rate, secret key rate, distortion at the adversary, and distortion at the legitimate receiver. We demonstrate that side information at the adversary plays a pivotal role, and provide a number of examples that motivate and give insight into our results.

Original languageEnglish (US)
Title of host publication2013 IEEE International Symposium on Information Theory, ISIT 2013
Pages2219-2223
Number of pages5
DOIs
StatePublished - Dec 19 2013
Event2013 IEEE International Symposium on Information Theory, ISIT 2013 - Istanbul, Turkey
Duration: Jul 7 2013Jul 12 2013

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Other

Other2013 IEEE International Symposium on Information Theory, ISIT 2013
CountryTurkey
CityIstanbul
Period7/7/137/12/13

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint Dive into the research topics of 'Rate-distortion theory for secrecy systems'. Together they form a unique fingerprint.

  • Cite this

    Schieler, C., & Cuff, P. (2013). Rate-distortion theory for secrecy systems. In 2013 IEEE International Symposium on Information Theory, ISIT 2013 (pp. 2219-2223). [6620620] (IEEE International Symposium on Information Theory - Proceedings). https://doi.org/10.1109/ISIT.2013.6620620