DocumentCode :
110314
Title :
Secure Source Coding With a Helper
Author :
Tandon, Ravi ; Ulukus, Sennur ; Ramchandran, Kannan
Author_Institution :
Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA
Volume :
59
Issue :
4
fYear :
2013
fDate :
Apr-13
Firstpage :
2178
Lastpage :
2187
Abstract :
We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source Xn and wishes to transmit this source losslessly to Bob over a rate-limited link of capacity not exceeding Rx . A helper, say Helen, observes an i.i.d. correlated source Yn and can transmit information to Bob over another link of capacity not exceeding Ry. A passive eavesdropper (say Eve) can observe the coded output of Alice, i.e., the link from Alice to Bob is public. The uncertainty about the source Xn at Eve (denoted by Δ) is measured by the conditional entropy [(H(Xn|Jx))/(n)] , where Jx is the coded output of Alice and n is the block length. We completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf binning of Xn with respect to the coded side information received at Bob is optimal. We next consider a modification of this model in which Alice also has access to the coded output of Helen. We call this model as the two-sided helper model. For the two-sided helper model, we characterize the rate-equivocation region. While the availability of side information at Alice does not reduce the rate of transmission from Alice, it significantly enhances the resulting equivocation at Eve. In particular, the resulting equivocation for the two-sided helper case is shown to be min(H(X),Ry), i.e., one bit from the two-sided helper provides one bit of uncertainty at Eve. From this result, we infer that Slepian-Wolf binning of X is suboptimal and one can further decrease the information leakage to the eavesdropper by utilizing the side information at Alice. We, finally, generalize both of these results to the case in which there is additional uncoded side information Wn available at Bob and characterize the rate-equivocati- n regions under the assumption that YnXnWn forms a Markov chain.
Keywords :
Markov processes; source coding; Markov chain; Slepian-Wolf binning; block length; conditional entropy; information leakage; passive eavesdropper; rate-equivocation region; rate-limited helper; rate-limited link; secure lossless source coding problem; two-sided helper model; uncoded side information; Indexes; Markov processes; Propagation losses; Source coding; Uncertainty; Zinc; Equivocation; helper problem; lossless source coding;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2012.2236973
Filename :
6399603
Link To Document :
بازگشت