Cargando…
Private Key and Decoder Side Information for Secure and Private Source Coding †
We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9778382/ https://www.ncbi.nlm.nih.gov/pubmed/36554121 http://dx.doi.org/10.3390/e24121716 |
_version_ | 1784856345790382080 |
---|---|
author | Günlü, Onur Schaefer, Rafael F. Boche, Holger Poor, Harold Vincent |
author_facet | Günlü, Onur Schaefer, Rafael F. Boche, Holger Poor, Harold Vincent |
author_sort | Günlü, Onur |
collection | PubMed |
description | We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of the remote source; [Formula: see text] a private key is available to all legitimate terminals; [Formula: see text] the public communication link between the encoder and decoder is rate-limited; and [Formula: see text] the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels. |
format | Online Article Text |
id | pubmed-9778382 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-97783822022-12-23 Private Key and Decoder Side Information for Secure and Private Source Coding † Günlü, Onur Schaefer, Rafael F. Boche, Holger Poor, Harold Vincent Entropy (Basel) Article We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of the remote source; [Formula: see text] a private key is available to all legitimate terminals; [Formula: see text] the public communication link between the encoder and decoder is rate-limited; and [Formula: see text] the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels. MDPI 2022-11-24 /pmc/articles/PMC9778382/ /pubmed/36554121 http://dx.doi.org/10.3390/e24121716 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Günlü, Onur Schaefer, Rafael F. Boche, Holger Poor, Harold Vincent Private Key and Decoder Side Information for Secure and Private Source Coding † |
title | Private Key and Decoder Side Information for Secure and Private Source Coding † |
title_full | Private Key and Decoder Side Information for Secure and Private Source Coding † |
title_fullStr | Private Key and Decoder Side Information for Secure and Private Source Coding † |
title_full_unstemmed | Private Key and Decoder Side Information for Secure and Private Source Coding † |
title_short | Private Key and Decoder Side Information for Secure and Private Source Coding † |
title_sort | private key and decoder side information for secure and private source coding † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9778382/ https://www.ncbi.nlm.nih.gov/pubmed/36554121 http://dx.doi.org/10.3390/e24121716 |
work_keys_str_mv | AT gunluonur privatekeyanddecodersideinformationforsecureandprivatesourcecoding AT schaeferrafaelf privatekeyanddecodersideinformationforsecureandprivatesourcecoding AT bocheholger privatekeyanddecodersideinformationforsecureandprivatesourcecoding AT poorharoldvincent privatekeyanddecodersideinformationforsecureandprivatesourcecoding |