Secure Multiterminal Source Coding With Actions

This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source Xn and wishes to compress this source lossyly to the decoder. Another encoder observes the source Yn and wants to compress this source losslessly to the decoder. A passive eavesdropper having access to the side information Zn can observe the information bits sent by the main encoder. In this scenario, the decoder is allowed to choose actions affecting the correlated source Yn and the side information Zn. For this problem, we characterize the optimal rate-distortion-cost-leakage region for a discrete memoryless setting.

[1]  Tobias J. Oechtering,et al.  Secure source coding with action-dependent side information , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[2]  H. Vincent Poor,et al.  Discriminatory Lossy Source Coding: Side Information Privacy , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  H. Vincent Poor,et al.  Lossless compression with security constraints , 2008, 2008 IEEE International Symposium on Information Theory.

[4]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[5]  Pablo Piantanida,et al.  Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.

[6]  Tobias J. Oechtering,et al.  Secure source coding with a public helper , 2013, 2013 IEEE International Symposium on Information Theory.

[7]  V. Prabhakaran,et al.  On Secure Distributed Source Coding , 2007, 2007 IEEE Information Theory Workshop.

[8]  Shraga I. Bross Secure Cooperative Source-Coding With Side Information at the Eavesdropper , 2016, IEEE Transactions on Information Theory.

[9]  Mikael Skoglund,et al.  The CEO Problem With Secrecy Constraints , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Kannan Ramchandran,et al.  Secure source coding with a helper , 2009 .

[11]  Haim H. Permuter,et al.  Source Coding With a Side Information “Vending Machine” , 2009, IEEE Transactions on Information Theory.

[12]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[13]  Haim H. Permuter,et al.  Lossless Coding of Correlated Sources With Actions , 2014, IEEE Transactions on Information Theory.

[14]  Sennur Ulukus,et al.  Secure lossy source coding with side information , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).