Successive Refinement of Shannon Cipher System Under Maximal Leakage

08/14/2023
by   Zhuangfei Wu, et al.
0

We study the successive refinement setting of Shannon cipher system (SCS) under the maximal leakage constraint for discrete memoryless sources under bounded distortion measures. Specifically, we generalize the threat model for the point-to-point rate-distortion setting of Issa, Wagner and Kamath (T-IT 2020) to the multiterminal successive refinement setting. Under mild conditions that correspond to partial secrecy, we characterize the asymptotically optimal normalized maximal leakage region for both the joint excess-distortion probability (JEP) and the expected distortion reliability constraints. Under JEP, in the achievability part, we propose a type-based coding scheme, analyze the reliability guarantee for JEP and bound the leakage of the information source through compressed versions. In the converse part, by analyzing a guessing scheme of the eavesdropper, we prove the optimality of our achievability result. Under expected distortion, the achievability part is established similarly to the JEP counterpart. The converse proof proceeds by generalizing the corresponding results for the rate-distortion setting of SCS by Schieler and Cuff (T-IT 2014) to the successive refinement setting. Somewhat surprisingly, the normalized maximal leakage regions under both JEP and expected distortion constraints are identical under certain conditions, although JEP appears to be a stronger reliability constraint.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/31/2018

Privacy Under Hard Distortion Constraints

We study the problem of data disclosure with privacy guarantees, wherein...
research
02/03/2021

Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

We study the information leakage to a guessing adversary in zero-error s...
research
04/06/2022

Hypergraph-based Source Codes for Function Computation Under Maximal Distortion

This work investigates functional source coding problems with maximal di...
research
08/08/2022

Achievable Refined Asymptotics for Successive Refinement Using Gaussian Codebooks

We study the mismatched successive refinement problem where one uses Gau...
research
07/01/2019

Rate Distortion Theorem and the Multicritical Point of Spin Glass

A spin system can be thought of as an information coding system that tra...
research
01/29/2023

The Secure CEO Problem With Physical Identifiers Under Logarithmic Loss and Quadratic Distortion Measures

In this paper, we investigate the fundamental limits of the chief execut...
research
09/28/2022

An Operational Approach to Information Leakage via Generalized Gain Functions

We introduce a gain function viewpoint of information leakage by proposi...

Please sign up or login with your details

Forgot password? Click here to reset