13 research outputs found
Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization
Recent work characterizing the optimal performance of secrecy systems has
made use of a distortion-like metric for partial secrecy as a replacement for
the more traditional metric of equivocation. In this work we use the log-loss
function to show that the optimal performance limits characterized by
equivocation are, in fact, special cases of distortion-based counterparts. This
observation illuminates why equivocation doesn't tell the whole story of
secrecy. It also justifies the causal-disclosure framework for secrecy (past
source symbols and actions revealed to the eavesdropper).Comment: Invited to ITA 2013, 3 pages, no figures, using IEEEtran.cl
Gaussian Secure Source Coding and Wyner's Common Information
We study secure source-coding with causal disclosure, under the Gaussian
distribution. The optimality of Gaussian auxiliary random variables is shown in
various scenarios. We explicitly characterize the tradeoff between the rates of
communication and secret key. This tradeoff is the result of a mutual
information optimization under Markov constraints. As a corollary, we deduce a
general formula for Wyner's Common Information in the Gaussian setting.Comment: ISIT 2015, 5 pages, uses IEEEtran.cl
Joint Source-Channel Secrecy Using Hybrid Coding
The secrecy performance of a source-channel model is studied in the context
of lossy source compression over a noisy broadcast channel. The source is
causally revealed to the eavesdropper during decoding. The fidelity of the
transmission to the legitimate receiver and the secrecy performance at the
eavesdropper are both measured by a distortion metric. Two achievability
schemes using the technique of hybrid coding are analyzed and compared with an
operationally separate source-channel coding scheme. A numerical example is
provided and the comparison results show that the hybrid coding schemes
outperform the operationally separate scheme.Comment: 5 pages, 1 figure, ISIT 201
A Bit of Secrecy for Gaussian Source Compression
In this paper, the compression of an independent and identically distributed
Gaussian source sequence is studied in an unsecure network. Within a game
theoretic setting for a three-party noiseless communication network (sender
Alice, legitimate receiver Bob, and eavesdropper Eve), the problem of how to
efficiently compress a Gaussian source with limited secret key in order to
guarantee that Bob can reconstruct with high fidelity while preventing Eve from
estimating an accurate reconstruction is investigated. It is assumed that Alice
and Bob share a secret key with limited rate. Three scenarios are studied, in
which the eavesdropper ranges from weak to strong in terms of the causal side
information she has. It is shown that one bit of secret key per source symbol
is enough to achieve perfect secrecy performance in the Gaussian squared error
setting, and the information theoretic region is not optimized by joint
Gaussian random variables
Source-Channel Secrecy with Causal Disclosure
Imperfect secrecy in communication systems is investigated. Instead of using
equivocation as a measure of secrecy, the distortion that an eavesdropper
incurs in producing an estimate of the source sequence is examined. The
communication system consists of a source and a broadcast (wiretap) channel,
and lossless reproduction of the source sequence at the legitimate receiver is
required. A key aspect of this model is that the eavesdropper's actions are
allowed to depend on the past behavior of the system. Achievability results are
obtained by studying the performance of source and channel coding operations
separately, and then linking them together digitally. Although the problem
addressed here has been solved when the secrecy resource is shared secret key,
it is found that substituting secret key for a wiretap channel brings new
insights and challenges: the notion of weak secrecy provides just as much
distortion at the eavesdropper as strong secrecy, and revealing public messages
freely is detrimental.Comment: Allerton 2012, 6 pages. Updated version includes acknowledgement
Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber
Optical networks are vulnerable to physical layer attacks; wiretappers can
improperly receive messages intended for legitimate recipients. Our work
considers an aspect of this security problem within the domain of multimode
fiber (MMF) transmission. MMF transmission can be modeled via a broadcast
channel in which both the legitimate receiver's and wiretapper's channels are
multiple-input-multiple-output complex Gaussian channels. Source-channel coding
analyses based on the use of distortion as the metric for secrecy are
developed. Alice has a source sequence to be encoded and transmitted over this
broadcast channel so that the legitimate user Bob can reliably decode while
forcing the distortion of wiretapper, or eavesdropper, Eve's estimate as high
as possible. Tradeoffs between transmission rate and distortion under two
extreme scenarios are examined: the best case where Eve has only her channel
output and the worst case where she also knows the past realization of the
source. It is shown that under the best case, an operationally separate
source-channel coding scheme guarantees maximum distortion at the same rate as
needed for reliable transmission. Theoretical bounds are given, and
particularized for MMF. Numerical results showing the rate distortion tradeoff
are presented and compared with corresponding results for the perfect secrecy
case.Comment: 30 pages, 5 figures, accepted to IEEE Transactions on Communication
Rate-Distortion Theory for Secrecy Systems
Secrecy in communication systems is measured herein by the distortion that an
adversary incurs. The transmitter and receiver share secret key, which they use
to encrypt communication and ensure distortion at an adversary. A model is
considered in which an adversary not only intercepts the communication from the
transmitter to the receiver, but also potentially has side information.
Specifically, the adversary may have causal or noncausal access to a signal
that is correlated with the source sequence or the receiver's reconstruction
sequence. The main contribution is the characterization of the optimal tradeoff
among communication rate, secret key rate, distortion at the adversary, and
distortion at the legitimate receiver. It is demonstrated that causal side
information at the adversary plays a pivotal role in this tradeoff. It is also
shown that measures of secrecy based on normalized equivocation are a special
case of the framework.Comment: Update version, to appear in IEEE Transactions on Information Theor
Distributed Channel Synthesis
Two familiar notions of correlation are rediscovered as the extreme operating
points for distributed synthesis of a discrete memoryless channel, in which a
stochastic channel output is generated based on a compressed description of the
channel input. Wyner's common information is the minimum description rate
needed. However, when common randomness independent of the input is available,
the necessary description rate reduces to Shannon's mutual information. This
work characterizes the optimal trade-off between the amount of common
randomness used and the required rate of description. We also include a number
of related derivations, including the effect of limited local randomness, rate
requirements for secrecy, applications to game theory, and new insights into
common information duality.
Our proof makes use of a soft covering lemma, known in the literature for its
role in quantifying the resolvability of a channel. The direct proof
(achievability) constructs a feasible joint distribution over all parts of the
system using a soft covering, from which the behavior of the encoder and
decoder is inferred, with no explicit reference to joint typicality or binning.
Of auxiliary interest, this work also generalizes and strengthens this soft
covering tool.Comment: To appear in IEEE Trans. on Information Theory (submitted Aug., 2012,
accepted July, 2013), 26 pages, using IEEEtran.cl