Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

02/03/2021
by   Yucheng Liu, et al.
0

We study the information leakage to a guessing adversary in zero-error source coding. The source coding problem is defined by a confusion graph capturing the distinguishability between source symbols. The information leakage is measured by the ratio of the adversary's successful guessing probability after and before eavesdropping the codeword, maximized over all possible source distributions. Such measurement under the basic adversarial model where the adversary makes a single guess and allows no distortion between its estimator and the true sequence is known as the maximum min-entropy leakage or the maximal leakage in the literature. We develop a single-letter characterization of the optimal normalized leakage under the basic adversarial model, together with an optimum-achieving scalar stochastic mapping scheme. An interesting observation is that the optimal normalized leakage is equal to the optimal compression rate with fixed-length source codes, both of which can be simultaneously achieved by some deterministic coding schemes. We then extend the leakage measurement to generalized adversarial models where the adversary makes multiple guesses and allows certain level of distortion, for which we derive single-letter lower and upper bounds.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/14/2023

Successive Refinement of Shannon Cipher System Under Maximal Leakage

We study the successive refinement setting of Shannon cipher system (SCS...
research
09/28/2022

An Operational Approach to Information Leakage via Generalized Gain Functions

We introduce a gain function viewpoint of information leakage by proposi...
research
10/14/2020

Learning, compression, and leakage: Minimizing classification error via meta-universal compression principles

Learning and compression are driven by the common aim of identifying and...
research
07/20/2018

An Operational Approach to Information Leakage

Given two random variables X and Y, an operational approach is undertake...
research
11/07/2022

Zero-Error Coding for Computing with Encoder Side-Information

We study the zero-error source coding problem in which an encoder with S...
research
02/27/2018

Leakage and Protocol Composition in a Game-Theoretic Perspective

In the inference attacks studied in Quantitative Information Flow (QIF),...
research
05/10/2023

Secure Block Joint Source-Channel Coding with Sequential Encoding

We extend the results of Ghourchian et al. [IEEE JSAIT-2021], to joint s...

Please sign up or login with your details

Forgot password? Click here to reset