Secure source coding with a helper

We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an i.i.d. source Xn and wishes to transmit this source loss-lessly to Bob at a rate R x . A helper, say Helen, observes a correlated source Yn and transmits at a rate R y to Bob. A passive eavesdropper can observe the coded output of Alice. The equivocation Δ is measured by the conditional entropy H(Xn\ J x )/n, where J x is the coded output of Alice. We first completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf type coding is optimal. We next study two generalizations of this model and provide single-letter characterizations for the respective rate-equivocation regions. In particular, we first consider the case of a two-sided helper where Alice also has access to the coded output of Helen. We show that for this case, Slepian-Wolf type coding is suboptimal and one can further decrease the information leakage to the eavesdropper by utilizing the side-information at Alice. We finally generalize this result to the case when there are both secure and insecure rate-limited links from Helen and additional uncoded side informations Wn and Zn available at Bob and Eve, respectively. For this model, we provide a complete characterization of the rate-equivocation region when Yn → Xn → (Wn, Zn) forms a Markov chain.

[1]  Etienne Perron,et al.  Cooperative Source Coding with Encoder Breakdown , 2007, 2007 IEEE International Symposium on Information Theory.

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Pablo Piantanida,et al.  Secure lossy source coding with side information at the decoders , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Haim H. Permuter,et al.  Problems we can solve with a helper , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[5]  V. Prabhakaran,et al.  On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.

[6]  Michael Gastpar,et al.  Discriminatory source coding for a noiseless broadcast channel , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[7]  Rudolf Ahlswede,et al.  Source coding with side information and a converse for degraded broadcast channels , 1975, IEEE Trans. Inf. Theory.

[8]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[9]  Imre Csiszár,et al.  Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.

[10]  H. Vincent Poor,et al.  Lossless compression with security constraints , 2008, 2008 IEEE International Symposium on Information Theory.

[11]  Toby Berger,et al.  Rate-distortion for correlated sources with partially separated encoders , 1982, IEEE Trans. Inf. Theory.

[12]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[13]  Aaron D. Wyner,et al.  On source coding with side information at the decoder , 1975, IEEE Trans. Inf. Theory.

[14]  Aaron D. Wyner,et al.  A theorem on the entropy of certain binary sequences and applications-II , 1973, IEEE Trans. Inf. Theory.

[15]  Deepa Kundur,et al.  Distributed Keyless Secret Sharing Over Noiseless Channels , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[16]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[17]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[18]  H. Vincent Poor,et al.  Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.