2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014
DOI: 10.1109/allerton.2014.7028530
|View full text |Cite
|
Sign up to set email alerts
|

A rate-distortion based secrecy system with side information at the decoders

Abstract: A secrecy system with side information at the decoders is studied in the context of lossy source compression over a noiseless broadcast channel. The decoders have access to different side information sequences that are correlated with the source. The fidelity of the communication to the legitimate receiver is measured by a distortion metric, as is traditionally done in the Wyner-Ziv problem. The secrecy performance of the system is also evaluated under a distortion metric. An achievable rate-distortion region … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

4
4

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…In the heart of the proof stands a stronger version of the soft-covering lemma which is key for the security analysis. Wyner's original soft-covering lemma [13,Theorem 6.3] is a valuable tool for achievability proofs of information theoretic security [14]- [17], resolvability [18], channel synthesis [19], and source coding [20] (see also references therein). The result herein sharpens the claim of softcovering by moving away from an expected value analysis.…”
mentioning
confidence: 99%
“…In the heart of the proof stands a stronger version of the soft-covering lemma which is key for the security analysis. Wyner's original soft-covering lemma [13,Theorem 6.3] is a valuable tool for achievability proofs of information theoretic security [14]- [17], resolvability [18], channel synthesis [19], and source coding [20] (see also references therein). The result herein sharpens the claim of softcovering by moving away from an expected value analysis.…”
mentioning
confidence: 99%
“…In the heart of the proof stands a stronger version of the soft-covering lemma which is key for the security analysis. Wyner's original soft-covering lemma [13,Theorem 6.3] is a valuable tool for achievability proofs of information theoretic security [14]- [17], resolvability [18], channel synthesis [19], and source coding [20] (see also references therein). The result herein sharpens the claim of softcovering by moving away from an expected value analysis.…”
mentioning
confidence: 99%
“…The likelihood encoder also simplifies analysis in secrecy settings, though this was not demonstrated within this paper. In the secrecy settings [17], [32], [33], a superposition codebook together with a superposition version of the soft-covering lemma is typically required.…”
Section: Discussionmentioning
confidence: 99%
“…where (34) follows from Property 1(e) and (35) follows from (31), (32) and Property 1(d). By Property 1(b),…”
Section: B Achievability Proof Using the Likelihood Encodermentioning
confidence: 99%