By Topic

Secure Source Coding With a Helper

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Tandon, R. ; Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA ; Ulukus, S. ; Ramchandran, K.

We consider a secure lossless source coding problem with a rate-limited helper. In particular, Alice observes an independent and identically distributed (i.i.d.) source Xn and wishes to transmit this source losslessly to Bob over a rate-limited link of capacity not exceeding Rx . A helper, say Helen, observes an i.i.d. correlated source Yn and can transmit information to Bob over another link of capacity not exceeding Ry. A passive eavesdropper (say Eve) can observe the coded output of Alice, i.e., the link from Alice to Bob is public. The uncertainty about the source Xn at Eve (denoted by Δ) is measured by the conditional entropy [(H(Xn|Jx))/(n)] , where Jx is the coded output of Alice and n is the block length. We completely characterize the rate-equivocation region for this secure source coding model, where we show that Slepian-Wolf binning of Xn with respect to the coded side information received at Bob is optimal. We next consider a modification of this model in which Alice also has access to the coded output of Helen. We call this model as the two-sided helper model. For the two-sided helper model, we characterize the rate-equivocation region. While the availability of side information at Alice does not reduce the rate of transmission from Alice, it significantly enhances the resulting equivocation at Eve. In particular, the resulting equivocation for the two-sided helper case is shown to be min(H(X),Ry), i.e., one bit from the two-sided helper provides one bit of uncertainty at Eve. From this result, we infer that Slepian-Wolf binning of X is suboptimal and one can further decrease the information leakage to the eavesdropper by utilizing the side information at Alice. We, finally, generalize both of these results to the case in which there is additional uncoded side information Wn available at Bob and characterize the rate-equivocati- n regions under the assumption that YnXnWn forms a Markov chain.

Published in:

Information Theory, IEEE Transactions on  (Volume:59 ,  Issue: 4 )