@inproceedings{8ae81d9c82854f7e85862e1f49db443e,
title = "Secure coordination with a two-sided helper",
abstract = "We investigate the problem of secure source coding with a two-sided helper in a game-theoretic framework. Alice (A) and Helen (H) view iid correlated information sequences Xn and Yn respectively. Alice communicates to Bob (B) at rate R, while H broadcasts a message to both A and B at rate RH. Additionally, A and B share secret key K at rate R 0 that is independent of (Xn, Yn). An active adversary, Eve (E) sees all communication links while having access to a (possibly degraded) version of the past information. We characterize the rate-payoff region for this problem. We also solve the problem when the link from A to B is private. Our work recovers previous results of Schieler-Cuff and Kittichokechai et al.",
author = "Sanket Satpathy and Paul Cuff",
year = "2014",
doi = "10.1109/ISIT.2014.6874864",
language = "English (US)",
isbn = "9781479951864",
series = "IEEE International Symposium on Information Theory - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "406--410",
booktitle = "2014 IEEE International Symposium on Information Theory, ISIT 2014",
address = "United States",
note = "2014 IEEE International Symposium on Information Theory, ISIT 2014 ; Conference date: 29-06-2014 Through 04-07-2014",
}