2022
DOI: 10.3390/e24121716
|View full text |Cite
|
Sign up to set email alerts
|

Private Key and Decoder Side Information for Secure and Private Source Coding

Abstract: We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (1) all terminals noncausally observe a noisy measurement of the remote source; (2) a private key is available to all legitimate terminals; (3) the public communication link between the encoder and decoder is rate-limited; and (4) the secrecy leakage to the eavesdropper is measured with resp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
6
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 56 publications
0
6
0
1
Order By: Relevance
“…Therefore, considering the setting where both helper data are available on Eve's side is of sufficient interest, and the current work deals with such a scenario. Slepian-Wolf type of multiterminal source coding models with a shared secret key is investigated in [29], [30]. In these models, the task of the CEO is to estimate a lossy version of the measurement observed at the encoder within a certain distortion value, which is different from our settings.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore, considering the setting where both helper data are available on Eve's side is of sufficient interest, and the current work deals with such a scenario. Slepian-Wolf type of multiterminal source coding models with a shared secret key is investigated in [29], [30]. In these models, the task of the CEO is to estimate a lossy version of the measurement observed at the encoder within a certain distortion value, which is different from our settings.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…For instance, suppose that face is availed as the information source in a private remote authentication. The models in [29], [30] correspond to the case where the CEO tries to reproduce the scanned face (the noisy image of the original face), while in our model, the CEO is interested in reconstructing the original face, e.g., as a means to confirm whether the identified person is a legitimate user or not. In this sense, our settings may be more realistic.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Focusing on coding theory over rings, a new weight that extends the traditional Hamming weight used for algebraic structures is proposed and its properties are analyzed in [ 8 ]. Moreover, security aspects for future communication and computation systems are considered to analyze Gaussian wiretap channels with a jammer that overhears the transmissions [ 9 ], to propose new polynomial codes that enable straggler-tolerant secure matrix multiplication [ 10 ], and to illustrate the private-key rate regimes observed when reconstructing source sequences at another node with side information under privacy and security constraints [ 11 ]. It is expected that these contributions will have a significant impact on the applications of information and coding theory to future communication and computation systems.…”
mentioning
confidence: 99%