Private Key and Decoder Side Information for Secure and Private Source Coding †

Research output: Contribution to journalResearch articleContributedpeer-review

Contributors

  • Onur Günlü - , Linköping University (Author)
  • Rafael F. Schaefer - , Chair of Information Theory and Machine Learning, BMBF Research Hub 6G-Life (Author)
  • Holger Boche - , Technical University of Munich, Ruhr University Bochum, Munich Center for Quantum Science and Technology (MCQST) (Author)
  • Harold Vincent Poor - , Princeton University (Author)

Abstract

We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (Formula presented.) all terminals noncausally observe a noisy measurement of the remote source; (Formula presented.) a private key is available to all legitimate terminals; (Formula presented.) the public communication link between the encoder and decoder is rate-limited; and (Formula presented.) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information under security, privacy, communication, and distortion constraints. By replacing the distortion constraint with a reliability constraint, we obtain the exact rate region for the lossless case as well. Furthermore, the lossy rate region for scalar discrete-time Gaussian sources and measurement channels is established. An achievable lossy rate region that can be numerically computed is also provided for binary-input multiple additive discrete-time Gaussian noise measurement channels.

Details

Original languageEnglish
Article number1716
JournalEntropy
Volume24
Issue number12
Publication statusPublished - Dec 2022
Peer-reviewedYes

Keywords

Keywords

  • information theoretic security, private key, remote source, secure source coding, side information

Library keywords