Secure distributed lossless compression with side information at the eavesdropper

نویسندگان

  • Joffrey Villard
  • Pablo Piantanida
چکیده

This paper investigates the problem of secure distributed lossless compression in the presence of arbitrarily correlated side information at an eavesdropper. This scenario consists of two encoders (referred to as Alice and Charlie) that wish to reliably transmit their respective (correlated) sources to a legitimate receiver (referred to as Bob) while satisfying some requirement on the equivocation rate at the eavesdropper (referred to as Eve). Error-free rate-limited channels are assumed between the encoders and the legitimate receiver, one of which being perfectly observed by the eavesdropper, which also has access to a correlated source as side information. For instance, this problem can be seen as a generalization of the well-known Slepian-Wolf problem taking into account the security requirements. A complete characterization of the compression-equivocation rates region for the case of arbitrarily correlated sources is derived. It is shown that the statistical differences between the sources can be useful in terms of secrecy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Source coding under security constraints

Information theoretic security characterizes the fundamental limitations of unconditional security against computationally unbounded adversaries. In this chapter, secure distributed compression in the presence of eavesdropper(s) is considered from the information theoretic security perspective. Basic models and fundamental results are summarized for lossless and lossy source compression. Distri...

متن کامل

An Overview of the Use of Distributed Source Coding in Multimedia Security

In the 1970’s Slepian and Wolf proved that lossless source coding without side information at the encoder may perform as well as encoding with side information at the encoder. Wyner and Ziv extended the result to establish ratedistortion bounds for lossy compression. This has been used to examine the problem of coding multiple correlated distributed sources. In distributed coding, source statis...

متن کامل

Generalised secure distributed source coding with side information

In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, ...

متن کامل

Title of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS

Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...

متن کامل

Source Coding with Decoder Side Information

In this report, we study source coding problems with decoder side information (SI). Source coding problems with decoder side information are a special case of distributed source coding problems. We outline the relation between various distributed source coding problems in Table 1 with the help of Figure 1. For reference, we also include the standard single-source lossless and lossy compression ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011