Cargando…

Private Key and Decoder Side Information for Secure and Private Source Coding †

We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of...

Descripción completa

Detalles Bibliográficos
Autores principales: Günlü, Onur, Schaefer, Rafael F., Boche, Holger, Poor, Harold Vincent
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9778382/
https://www.ncbi.nlm.nih.gov/pubmed/36554121
http://dx.doi.org/10.3390/e24121716
_version_ 1784856345790382080
author Günlü, Onur
Schaefer, Rafael F.
Boche, Holger
Poor, Harold Vincent
author_facet Günlü, Onur
Schaefer, Rafael F.
Boche, Holger
Poor, Harold Vincent
author_sort Günlü, Onur
collection PubMed
description We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of the remote source; [Formula: see text] a private key is available to all legitimate terminals; [Formula: see text] the public communication link between the encoder and decoder is rate-limited; and [Formula: see text] the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels.
format Online
Article
Text
id pubmed-9778382
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-97783822022-12-23 Private Key and Decoder Side Information for Secure and Private Source Coding † Günlü, Onur Schaefer, Rafael F. Boche, Holger Poor, Harold Vincent Entropy (Basel) Article We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: [Formula: see text] all terminals noncausally observe a noisy measurement of the remote source; [Formula: see text] a private key is available to all legitimate terminals; [Formula: see text] the public communication link between the encoder and decoder is rate-limited; and [Formula: see text] the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels. MDPI 2022-11-24 /pmc/articles/PMC9778382/ /pubmed/36554121 http://dx.doi.org/10.3390/e24121716 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Günlü, Onur
Schaefer, Rafael F.
Boche, Holger
Poor, Harold Vincent
Private Key and Decoder Side Information for Secure and Private Source Coding †
title Private Key and Decoder Side Information for Secure and Private Source Coding †
title_full Private Key and Decoder Side Information for Secure and Private Source Coding †
title_fullStr Private Key and Decoder Side Information for Secure and Private Source Coding †
title_full_unstemmed Private Key and Decoder Side Information for Secure and Private Source Coding †
title_short Private Key and Decoder Side Information for Secure and Private Source Coding †
title_sort private key and decoder side information for secure and private source coding †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9778382/
https://www.ncbi.nlm.nih.gov/pubmed/36554121
http://dx.doi.org/10.3390/e24121716
work_keys_str_mv AT gunluonur privatekeyanddecodersideinformationforsecureandprivatesourcecoding
AT schaeferrafaelf privatekeyanddecodersideinformationforsecureandprivatesourcecoding
AT bocheholger privatekeyanddecodersideinformationforsecureandprivatesourcecoding
AT poorharoldvincent privatekeyanddecodersideinformationforsecureandprivatesourcecoding