2014 IEEE International Symposium on Information Theory 2014
DOI: 10.1109/isit.2014.6874934
|View full text |Cite
|
Sign up to set email alerts
|

The CEO problem with secrecy constraints

Abstract: Abstract-We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate the remote source based on the information received from the agents within a certain mean distortion thres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 32 publications
(31 reference statements)
0
2
0
Order By: Relevance
“…In fact, our setup is a generalization of the previous cases considered for lossy secure source coding problems. We extend our previous work [31] for the lossless variant of this problem to the lossy case and derive inner and outer bounds on the rate-distortion-equivocation region of the CEO problem with secrecy constraints. We also investigate the region in special cases where the bounds are tight and we show that for these special cases our results coincide with the previous results in the literature.…”
Section: B Contributionsmentioning
confidence: 94%
“…In fact, our setup is a generalization of the previous cases considered for lossy secure source coding problems. We extend our previous work [31] for the lossless variant of this problem to the lossy case and derive inner and outer bounds on the rate-distortion-equivocation region of the CEO problem with secrecy constraints. We also investigate the region in special cases where the bounds are tight and we show that for these special cases our results coincide with the previous results in the literature.…”
Section: B Contributionsmentioning
confidence: 94%
“…From an information theoretic perspective, the authors in [16], [17], [18] studied the secrecy capacity in the case of full CSI or partial CSI. Multiterminal source coding or CEO problems with secrecy constraints were also considered in [19], [20], [21]. However, although the secure source coding techniques enable one to gain information-theoretic insights, it does not provide a closed form expression for distortion achievable via multi-sensor estimation over fading channels.…”
Section: Introductionmentioning
confidence: 99%