Topological and Algebraic Properties for Classifying Unrooted Gaussian Trees under Privacy Constraints

In this paper, our objective is to find out how topological and algebraic properties of unrooted Gaussian tree models determine their security robustness, which is measured by our proposed max-min information (MaMI) metric. Such metric quantifies the amount of common randomness extractable through public discussion between two legitimate nodes under an eavesdropper attack. We show some general topological properties that the desired max-min solutions shall satisfy. Under such properties, we develop conditions under which comparable trees are put together to form partially ordered sets (posets). Each poset contains the most favorable structure as the poset leader, and the least favorable structure. Then, we compute the Tutte-like polynomial for each tree in a poset in order to assign a polynomial to any tree in a poset. Moreover, we propose a novel method, based on restricted integer partitions, to effectively enumerate all poset leaders. The results not only help us understand the security strength of different Gaussian trees, which is critical when we evaluate the information leakage issues for various jointly Gaussian distributed measurements in networks, but also provide us both an algebraic and a topological perspective in grasping some fundamental properties of such models.

[1]  Sanjay Chaudhuri,et al.  Qualitative inequalities for squared partial correlations of a Gaussian random vector , 2015, 1503.03879.

[2]  Kamal Lochan Patra,et al.  The effect on the algebraic connectivity of a tree by grafting or collapsing of edges , 2008 .

[3]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[4]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[5]  Seth Sullivant,et al.  Algebraic geometry of Gaussian Bayesian networks , 2007, Adv. Appl. Math..

[6]  David Eisenstat,et al.  Non-isomorphic caterpillars with identical subtree data , 2006, Discret. Math..

[7]  Yury Polyanskiy,et al.  Algebraic methods of classifying directed graphical models , 2014, 2014 IEEE International Symposium on Information Theory.

[8]  George T. Amariucai,et al.  Evaluation of security robustness against information leakage in Gaussian polytree graphical models , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[9]  W. Trotter,et al.  Combinatorics and Partially Ordered Sets: Dimension Theory , 1992 .

[10]  Rudolf Ahlswede,et al.  Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.

[11]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[12]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[13]  George T. Amariucai,et al.  Classifying Unrooted Gaussian Trees under Privacy Constraints , 2015, ArXiv.

[14]  Gary Gordon,et al.  Tutte polynomials for trees , 1991, J. Graph Theory.