The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List

We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this paper, we suppose that an eavesdropper produces a list of 2(nRL) reconstruction sequences and measure secrecy by the minimum distortion over the entire list. We show that this setting is equivalent to one in which an eavesdropper must reconstruct a single sequence, but also receives side information about the source sequence and public message from a rate-limited henchman (a helper for an adversary). We characterize the optimal tradeoff of secret key rate, list rate, and eavesdropper distortion. The solution hinges on a problem of independent interest: lossy compression of a codeword uniformly drawn from a random codebook. We also characterize the solution to the lossy communication version of the problem in which distortion is allowed at the legitimate receiver. The analysis in both the settings is greatly aided by a recent technique for proving source coding results with the use of a likelihood encoder.

[1]  Anant Sahai,et al.  On the uniform continuity of the rate-distortion function , 2008, 2008 IEEE International Symposium on Information Theory.

[2]  Neri Merhav,et al.  The Shannon cipher system with a guessing wiretapper , 1999, IEEE Trans. Inf. Theory.

[3]  Hirosuke Yamamoto Rate-distortion theory for the Shannon cipher system , 1997, IEEE Trans. Inf. Theory.

[4]  H. Vincent Poor,et al.  The likelihood encoder for lossy source compression , 2014, 2014 IEEE International Symposium on Information Theory.

[5]  Tsachy Weissman,et al.  The empirical distribution of rate-constrained source codes , 2004, IEEE Transactions on Information Theory.

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Paul W. Cuff,et al.  The Henchman problem: Measuring secrecy by the minimum distortion in a list , 2014, ISIT.

[8]  Paul W. Cuff,et al.  The likelihood encoder for source coding , 2013, 2013 IEEE Information Theory Workshop (ITW).

[9]  Evgueni A. Haroutunian On the Shannon cipher system with a wiretapper guessing subject to distortion and reliability requirements , 2002, Proceedings IEEE International Symposium on Information Theory,.

[10]  Gou Hosoya,et al.  国際会議参加報告:2014 IEEE International Symposium on Information Theory , 2014 .

[11]  H. Vincent Poor,et al.  The Likelihood Encoder for Lossy Compression , 2014, IEEE Transactions on Information Theory.

[12]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[13]  O. F. Cook The Method of Types , 1898 .

[14]  Paul W. Cuff,et al.  Distributed Channel Synthesis , 2012, IEEE Transactions on Information Theory.

[15]  Paul W. Cuff,et al.  Rate-distortion theory for secrecy systems , 2013, 2013 IEEE International Symposium on Information Theory.