Secure and Private Source Coding with Private Key and Decoder Side
Information
- URL: http://arxiv.org/abs/2205.05068v1
- Date: Tue, 10 May 2022 17:51:28 GMT
- Title: Secure and Private Source Coding with Private Key and Decoder Side
Information
- Authors: Onur G\"unl\"u, Rafael F. Schaefer, Holger Boche, and H. Vincent Poor
- Abstract summary: The problem of secure source coding with multiple terminals is extended by considering a remote source whose noisy measurements are correlated random variables.
The main additions to the problem include 1) all terminals noncausally observe a noisy measurement of the remote source; 2) a private key is available to all legitimate terminals; 3) the public communication link between the encoder and decoder is rate-limited; 4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source.
- Score: 139.515333493829
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The problem of secure source coding with multiple terminals is extended by
considering a remote source whose noisy measurements are the correlated random
variables used for secure source reconstruction. The main additions to the
problem include 1) all terminals noncausally observe a noisy measurement of the
remote source; 2) a private key is available to all legitimate terminals; 3)
the public communication link between the encoder and decoder is rate-limited;
4) the secrecy leakage to the eavesdropper is measured with respect to the
encoder input, whereas the privacy leakage is measured with respect to the
remote source. Exact rate regions are characterized for a lossy source coding
problem with a private key, remote source, and decoder side information under
security, privacy, communication, and distortion constraints. By replacing the
distortion constraint with a reliability constraint, we obtain the exact rate
region also for the lossless case. Furthermore, the lossy rate region for
scalar discrete-time Gaussian sources and measurement channels is established.
Related papers
- Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks [59.43433767253956]
We consider the problem of privately estimating the mean of vectors distributed across different nodes of an unreliable wireless network.
In a semi-decentralized setup, nodes can collaborate with their neighbors to compute a local consensus, which they relay to a central server.
We study the tradeoff between collaborative relaying and privacy leakage due to the data sharing among nodes.
arXiv Detail & Related papers (2024-06-06T06:12:15Z) - Flexible polar encoding for information reconciliation in QKD [2.627883025193776]
Quantum Key Distribution (QKD) enables two parties to establish a common secret key that is information-theoretically secure.
Errors that are generally considered to be due to the adversary's tempering with the quantum channel need to be corrected using classical communication over a public channel.
We show that the reliability sequence can be derived and used to design an encoder independent of the choice of decoder.
arXiv Detail & Related papers (2023-11-30T16:01:10Z) - Think Twice before Driving: Towards Scalable Decoders for End-to-End
Autonomous Driving [74.28510044056706]
Existing methods usually adopt the decoupled encoder-decoder paradigm.
In this work, we aim to alleviate the problem by two principles.
We first predict a coarse-grained future position and action based on the encoder features.
Then, conditioned on the position and action, the future scene is imagined to check the ramification if we drive accordingly.
arXiv Detail & Related papers (2023-05-10T15:22:02Z) - Breaking the Communication-Privacy-Accuracy Tradeoff with
$f$-Differential Privacy [51.11280118806893]
We consider a federated data analytics problem in which a server coordinates the collaborative data analysis of multiple users with privacy concerns and limited communication capability.
We study the local differential privacy guarantees of discrete-valued mechanisms with finite output space through the lens of $f$-differential privacy (DP)
More specifically, we advance the existing literature by deriving tight $f$-DP guarantees for a variety of discrete-valued mechanisms.
arXiv Detail & Related papers (2023-02-19T16:58:53Z) - Fault-tolerant Coding for Entanglement-Assisted Communication [46.0607942851373]
This paper studies the study of fault-tolerant channel coding for quantum channels.
We use techniques from fault-tolerant quantum computing to establish coding theorems for sending classical and quantum information in this scenario.
We extend these methods to the case of entanglement-assisted communication, in particular proving that the fault-tolerant capacity approaches the usual capacity when the gate error approaches zero.
arXiv Detail & Related papers (2022-10-06T14:09:16Z) - Short Blocklength Wiretap Channel Codes via Deep Learning: Design and
Performance Evaluation [5.203329540700176]
We design short blocklength codes for the Gaussian wiretap channel under information-theoretic security guarantees.
We handle the reliability constraint via an autoencoder, and handle the secrecy constraint with hash functions.
For blocklengths smaller than or equal to 16, we evaluate through simulations the probability of error at the legitimate receiver.
arXiv Detail & Related papers (2022-06-07T17:52:46Z) - Dense Coding with Locality Restriction for Decoder: Quantum Encoders vs.
Super-Quantum Encoders [67.12391801199688]
We investigate dense coding by imposing various locality restrictions to our decoder.
In this task, the sender Alice and the receiver Bob share an entangled state.
arXiv Detail & Related papers (2021-09-26T07:29:54Z) - Secure Multi-Function Computation with Private Remote Sources [23.031902422592722]
We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication.
The distributed function computation is subject to constraints, including reliability and storage but also privacy and secrecy.
arXiv Detail & Related papers (2021-06-17T13:34:40Z) - Dual MINE-based Neural Secure Communications under Gaussian Wiretap
Channel [19.295410015140735]
We propose a dual mutual information neural estimation (MINE) based neural secure communications model.
The security performance of our model is guaranteed whether the eavesdropper learns the decoder himself or uses the legal decoder.
arXiv Detail & Related papers (2021-02-25T15:09:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.