Lossless secure source coding: Yamamoto's setting

Given a private source of information, Xn and a public correlated source, Yn, we study the problem of encoding the two-dimensional source (Xn; Yn) into an index J such that a remote party, knowing J and some external side information Zn, can losslessly recover Yn while any eavesdropper knowing J and possibly a correlated side information En can retrieve very little information about Xn. We give general converse results for the amount of information about Xn that might be leaked in such systems and and also achievability results that are optimal in some special cases.

[1]  Sennur Ulukus,et al.  Secure lossy source coding with side information , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Kannan Ramchandran,et al.  Secure Source Coding With a Helper , 2009, IEEE Transactions on Information Theory.

[3]  H. Vincent Poor,et al.  Lossless compression with security constraints , 2008, 2008 IEEE International Symposium on Information Theory.

[4]  Pablo Piantanida,et al.  Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.

[5]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[6]  Paul W. Cuff,et al.  Secrecy is cheap if the adversary must reconstruct , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[7]  H. Vincent Poor,et al.  Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.

[8]  Aaron D. Wyner,et al.  On source coding with side information at the decoder , 1975, IEEE Trans. Inf. Theory.

[9]  Abbas El Gamal,et al.  Network Information Theory , 2021, 2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT).

[10]  V. Prabhakaran,et al.  On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.

[11]  Hirosuke Yamamoto,et al.  A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers , 1983, IEEE Trans. Inf. Theory.