2021 IEEE Information Theory Workshop (ITW) 2021
DOI: 10.1109/itw48936.2021.9611508
|View full text |Cite
|
Sign up to set email alerts
|

Secure Source Coding with Side-information at Decoder and Shared Key at Encoder and Decoder

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…In ( 2 ) and ( 3 ), we consider conditional mutual information terms to take account of unavoidable secrecy and privacy leakages due to Eve’s side information, i.e., and , respectively; see also [ 21 , 32 ]. Furthermore, we consider conditional mutual information terms rather than corresponding conditional entropy terms, the latter of which is used in [ 6 , 14 , 33 , 34 , 35 ], to characterize the secrecy and privacy leakages simplifies our analysis.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In ( 2 ) and ( 3 ), we consider conditional mutual information terms to take account of unavoidable secrecy and privacy leakages due to Eve’s side information, i.e., and , respectively; see also [ 21 , 32 ]. Furthermore, we consider conditional mutual information terms rather than corresponding conditional entropy terms, the latter of which is used in [ 6 , 14 , 33 , 34 , 35 ], to characterize the secrecy and privacy leakages simplifies our analysis.…”
Section: System Modelmentioning
confidence: 99%
“…Allowing for the eavesdropper to access only a strict subset of all messages is also a method to enable secure distributed source coding, which was considered in [ 9 , 10 , 11 ]; see also [ 12 ], in which a similar method was applied to enable secure remote source reconstruction. Similarly, a private key that is shared by legitimate terminals and hidden from the eavesdropper can also provide such an advantage, as in [ 13 , 14 ].…”
Section: Introductionmentioning
confidence: 99%
“…♦ Note that in (2) and ( 3) we consider conditional mutual information terms to take account of unavoidable privacy and secrecy leakages due to Eve's side information; see also [21], [31]. Furthermore, considering conditional mutual information terms rather than corresponding conditional entropy terms, the latter of which is used in [6], [14], [32]- [34], to characterize the secrecy and privacy leakages simplifies our analysis.…”
Section: System Modelmentioning
confidence: 99%
“…for some P QV U XXY Z = P Q|V P V |U P U| X P X|X P X P Y Z|X (14) such that E d X, X(U, Y ) ≤ D for some reconstruction function X(U, Y ). The region R D is convexified by using the time-sharing random variable Q, required due to the We remark that ( 12) and (13) show that one can simultaneously achieve strong secrecy and strong privacy, i.e., unnormalized versions of (2) and (3), respectively, by using a large private key K, which is a result missing in some recent works on secure source coding with private key.…”
Section: A Lossy Source Codingmentioning
confidence: 99%
See 1 more Smart Citation