DocumentCode
640335
Title
A bit of secrecy for Gaussian source compression
Author
Song, Eva C. ; Cuff, Paul ; Poor, H. Vincent
Author_Institution
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
fYear
2013
fDate
7-12 July 2013
Firstpage
2567
Lastpage
2571
Abstract
In this paper, the compression of an independent and identically distributed Gaussian source sequence is studied in an unsecure network. Within a game theoretic setting for a three-party noiseless communication network (sender Alice, legitimate receiver Bob, and eavesdropper Eve), the problem of how to efficiently compress a Gaussian source with limited secret key in order to guarantee that Bob can reconstruct with high fidelity while preventing Eve from estimating an accurate reconstruction is investigated. It is assumed that Alice and Bob share a secret key with limited rate. Three scenarios are studied, in which the eavesdropper ranges from weak to strong in terms of the causal side information she has. It is shown that one bit of secret key per source symbol is enough to achieve perfect secrecy performance in the Gaussian squared error setting, and the information theoretic region is not optimized by joint Gaussian random variables.
Keywords
Gaussian processes; cryptography; game theory; source coding; telecommunication security; Gaussian source sequence; Gaussian squared error setting; causal side information; game theoretic setting; information theoretic region; joint Gaussian random variables; secrecy performance; secret key; three-party noiseless communication network; unsecure network; Decoding; Entropy; Quantization (signal); Random variables; Rate-distortion; Silicon;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on
Conference_Location
Istanbul
ISSN
2157-8095
Type
conf
DOI
10.1109/ISIT.2013.6620690
Filename
6620690
Link To Document