Secure and Private Source Coding with Private Key and Decoder Side Information

05/10/2022
by   Onur Günlü, et al.
0

The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are the correlated random variables used for secure source reconstruction. The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public communication link between the encoder and decoder is rate-limited; 4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region also for the lossless case. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2021

Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder

We study the problem of rate-distortion-equivocation with side-informati...
research
01/11/2022

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

The problem of reliable function computation is extended by imposing pri...
research
06/17/2021

Secure Multi-Function Computation with Private Remote Sources

We consider a distributed function computation problem in which parties ...
research
01/29/2023

The Secure CEO Problem With Physical Identifiers Under Logarithmic Loss and Quadratic Distortion Measures

In this paper, we investigate the fundamental limits of the chief execut...
research
07/12/2021

Quality of Service Guarantees for Physical Unclonable Functions

We consider a secret key agreement problem in which noisy physical unclo...
research
09/11/2018

Arbitrarily Varying Remote Sources

We study a lossy source coding problem for an arbitrarily varying remote...
research
09/03/2020

Secure Strong Coordination

We consider a network of two nodes separated by a noisy channel, in whic...

Please sign up or login with your details

Forgot password? Click here to reset