Unified Expression of Achievable Region in Privacy-Constrained Source Coding

05/21/2021
by   Naruki Shinohara, et al.
0

Privacy-constrained source coding problems have become increasingly important recently, and the utility-privacy trade-off has been investigated for various systems. As pioneering work, Yamamoto (1983) found theoretical limits of the coding rate, privacy and utility in two cases; (i) both public and private information is encoded and (ii) only public information is encoded. However, the theoretical limit has not been characterized in a more general case; (iii) encoded messages consist of public information and a part of private information. Then in this paper, we characterize the trade-off relation in case (iii). The obtained expression of the achievable region is a "unified expression" because it includes the ones in case (i) and (ii) as special cases. The numerical results also imply that the optimal privacy in case (i) and (iii) is securer than the one in case (ii) whereas for the optimal privacy, the achievable coding rates in case (ii) and (iii) are smaller than the one in case (i).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/16/2020

Arbitrarily Strong Utility-Privacy Trade-off in Decentralized Linear Estimation

Each agent in a network makes a local observation that is linearly relat...
research
01/13/2020

Distributed Secure Storage: Rate-Privacy Trade-Off and XOR-Based Coding Scheme

We consider the problem of storing data in a distributed manner over T s...
research
01/28/2022

Private Classical Communication over Quantum Multiple-Access Channels

We study private classical communication over quantum multiple-access ch...
research
04/09/2019

Private Pliable Index Coding

The Pliable Index CODing (PICOD) problem is a variant of the index codin...
research
01/09/2018

Multi-Terminal Codes Using Constrained-Random-Number Generators

A general multi-terminal source code and a general multi-terminal channe...
research
02/02/2023

Universal Coding for Shannon Ciphers under Side-Channel Attacks

We study the universal coding under side-channel attacks posed and inves...
research
09/15/2023

Privacy-Aware Joint Source-Channel Coding for image transmission based on Disentangled Information Bottleneck

Current privacy-aware joint source-channel coding (JSCC) works aim at av...

Please sign up or login with your details

Forgot password? Click here to reset