Secure distributed lossless compression with side information at the eavesdropper
نویسندگان
چکیده
This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocation rate at the eavesdropper (referred to as Eve). Error-free rate-limited channels are assumed between the encoders and the legitimate receiver, one of which being perfectly observed by the eavesdropper, which also has access to a correlated source as side information. For instance, this problem can be seen as a generalization of the well-known Slepian-Wolf problem taking into account the security requirements. A complete characterization of the compression-equivocation rates region for the case of arbitrarily correlated sources is derived. It is shown that the statistical differences between the sources can be useful in terms of secrecy.
منابع مشابه
Source coding under security constraints
Information theoretic security characterizes the fundamental limitations of unconditional security against computationally unbounded adversaries. In this chapter, secure distributed compression in the presence of eavesdropper(s) is considered from the information theoretic security perspective. Basic models and fundamental results are summarized for lossless and lossy source compression. Distri...
متن کاملAn Overview of the Use of Distributed Source Coding in Multimedia Security
In the 1970’s Slepian and Wolf proved that lossless source coding without side information at the encoder may perform as well as encoding with side information at the encoder. Wyner and Ziv extended the result to establish ratedistortion bounds for lossy compression. This has been used to examine the problem of coding multiple correlated distributed sources. In distributed coding, source statis...
متن کاملGeneralised secure distributed source coding with side information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, ...
متن کاملTitle of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS
Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...
متن کاملSource Coding with Decoder Side Information
In this report, we study source coding problems with decoder side information (SI). Source coding problems with decoder side information are a special case of distributed source coding problems. We outline the relation between various distributed source coding problems in Table 1 with the help of Figure 1. For reference, we also include the standard single-source lossless and lossy compression ...
متن کامل