2017 IEEE International Symposium on Information Theory (ISIT) 2017
DOI: 10.1109/isit.2017.8006988
|View full text |Cite
|
Sign up to set email alerts
|

Private Broadcasting: An index coding approach

Abstract: Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy and show how encoding matrices can be designed to achieve specific privacy guarantees. We then consider a s… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 14 publications
0
23
0
Order By: Relevance
“…First, we note that the rate constraint (4) and polymatroidal constraints (5)-(8) appeared in [11] to form an outer bound on the non-secure index coding capacity region 1 , which is known to be tight for all index coding problems with n ≤ 5 messages. Constraint (9) captures additional decoding conditions for each legitimate receiver i ∈ [n], since…”
Section: Polymatroidal Outer Boundmentioning
confidence: 99%
See 1 more Smart Citation
“…First, we note that the rate constraint (4) and polymatroidal constraints (5)-(8) appeared in [11] to form an outer bound on the non-secure index coding capacity region 1 , which is known to be tight for all index coding problems with n ≤ 5 messages. Constraint (9) captures additional decoding conditions for each legitimate receiver i ∈ [n], since…”
Section: Polymatroidal Outer Boundmentioning
confidence: 99%
“…The private index coding problem with linear codes was studied in [8] where the aim is to allow legitimate receivers to only learn about messages they want, but nothing of other unknown messages. Finally, [9], [10] considered the case in which the identity of the demanded message and the side information of each receiver should be kept private from other receivers.…”
Section: Introductionmentioning
confidence: 99%
“…This problem differs from secure index coding [9]: our goal is to protect the clients from an eavesdropper who wishes to learn the identities, rather than the contents, of the requested messages. Our initial work in [3] addressed the possibility of designing coding matrices that provide privacy guarantees for clients. The solutions based on k-limited-access schemes proposed in [1] can be interpreted as finding overcomplete bases that allow sparse representation of vectors, which is closely related to dictionary learning [10].…”
Section: Related Workmentioning
confidence: 99%
“…In [3], the Authors proposed an IC model where an eavesdropper has a limited access to the side information sets and to the transmitted codeword; the goal here is to prevent the eavesdropper from obtaining any new information. In [5], the Authors considered an IC model where the sender must design a code that allows each user to decode its desired message, but at the same time prevent him from obtaining any information about the side information or the desired messages of the other users. This latter model has the flavor of the private information retrieval problem [11], where a user wants to hide its desired message and/or side information from the other users and the server.…”
Section: Introductionmentioning
confidence: 99%