Secure and Private Source Coding with Private Key and Decoder Side Information

Onur Gunlu, Rafael F. Schaefer, Holger Boche, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public communication link between the encoder and decoder is rate-limited; and 4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region also for the lossless case. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established.

Original languageEnglish (US)
Title of host publication2022 IEEE Information Theory Workshop, ITW 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages226-231
Number of pages6
ISBN (Electronic)9781665483414
DOIs
StatePublished - 2022
Externally publishedYes
Event2022 IEEE Information Theory Workshop, ITW 2022 - Mumbai, India
Duration: Nov 1 2022Nov 9 2022

Publication series

Name2022 IEEE Information Theory Workshop, ITW 2022

Conference

Conference2022 IEEE Information Theory Workshop, ITW 2022
Country/TerritoryIndia
CityMumbai
Period11/1/2211/9/22

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Artificial Intelligence
  • Computational Theory and Mathematics
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure and Private Source Coding with Private Key and Decoder Side Information'. Together they form a unique fingerprint.

Cite this