Secure lossless compression

Yanina Y. Shkel, Rick S. Blum, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

The framework of secrecy by design is introduced and the fundamental limits of lossless data compression are analyzed for this setting. The main idea behind secrecy by design is to begin with an operational secrecy constraint, which is modeled by a secrecy function fs, and then to derive fundamental limits for the performance of the resulting secrecy system. Focusing on the non-asymptotic fundamental limits of lossless compression, variable-length lossless compression and fixed-length almost-lossless compression are studied. Although it is well known that the traditional fundamental limits of variable-length and almost lossless fixed-length compression are intimately related, this relationship collapses once the secrecy constraint is incorporated. The current paper focuses on the setting in which the value of the secrecy function is known to the decompressor as side information: The main challenge is to reconcile the outcome of the information source without violating the secrecy constraint.

Original languageEnglish (US)
Title of host publication2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781538605790
DOIs
StatePublished - May 21 2018
Event52nd Annual Conference on Information Sciences and Systems, CISS 2018 - Princeton, United States
Duration: Mar 21 2018Mar 23 2018

Publication series

Name2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018

Other

Other52nd Annual Conference on Information Sciences and Systems, CISS 2018
Country/TerritoryUnited States
CityPrinceton
Period3/21/183/23/18

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Secure lossless compression'. Together they form a unique fingerprint.

Cite this