The Secure CEO Problem With Physical Identifiers Under Logarithmic Loss and Quadratic Distortion Measures

01/29/2023
by   Vamoua Yachongka, et al.
0

In this paper, we investigate the fundamental limits of the chief executive officer (CEO) problem in which physical identifiers are treated as information sources. To make the information leakage of the identifiers to the eavesdropper via helper data negligible, private keys, uniformly and independently chosen, are bonded to measurements of the identifiers at the encoders to generate the helper data. The CEO problem is renowned for the difficulty in characterizing the tight rate-distortion region, which is still an open question for the general case. In this study, we characterize the tight rate-key-distortion regions of such a problem under two specific distortion measures, namely logarithmic loss (both discrete and Gaussian settings) and quadratic distortion measures. We also provide numerical calculations of the characterized regions, and the calculated results show that when a larger distortion is permitted, smaller storage and private-key rates are achievable. For special cases where the constraints of private-key rates and negligible leakage are not imposed, our characterizations naturally reduce to the rate-distortion regions provided by Courtade and Weissman (2014) for logarithmic loss distortion, and Prabhakaran et al. (2004), Chen et al. (2004), and Oohama (2005) for quadratic distortion measure.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/25/2019

Vector Gaussian CEO Problem Under Logarithmic Loss

In this paper, we study the vector Gaussian Chief Executive Officer (CEO...
research
05/10/2022

Secure and Private Source Coding with Private Key and Decoder Side Information

The problem of secure source coding with multiple terminals is extended ...
research
12/03/2018

The CEO Problem with rth Power of Difference and Logarithmic Distortions

The CEO problem has received a lot of attention since Berger et al. firs...
research
04/20/2022

Functional Covering of Point Processes

We introduce a new distortion measure for point processes called functio...
research
08/14/2023

Successive Refinement of Shannon Cipher System Under Maximal Leakage

We study the successive refinement setting of Shannon cipher system (SCS...
research
08/08/2022

Achievable Refined Asymptotics for Successive Refinement Using Gaussian Codebooks

We study the mismatched successive refinement problem where one uses Gau...
research
07/21/2023

Soft Guessing Under Log-Loss Distortion Allowing Errors

This paper deals with the problem of soft guessing under log-loss distor...

Please sign up or login with your details

Forgot password? Click here to reset