SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:liu-196948"
 

Search: onr:"swepub:oai:DiVA.org:liu-196948" > Secure and Private ...

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist
  • Günlü, OnurLinköpings universitet,Informationskodning,Tekniska fakulteten (author)

Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information

  • Article/chapterEnglish2023

Publisher, publication year, extent ...

  • IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC,2023
  • electronicrdacarrier

Numbers

  • LIBRIS-ID:oai:DiVA.org:liu-196948
  • https://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-196948URI
  • https://doi.org/10.1109/TIFS.2023.3286285DOI

Supplementary language notes

  • Language:English
  • Summary in:English

Part of subdatabase

Classification

  • Subject category:ref swepub-contenttype
  • Subject category:art swepub-publicationtype

Notes

  • Funding Agencies|Swedish Government; Zenith Research and Leadership Career Development Award; German Federal Ministry of Education and Research (BMBF) [16KISK001K]; BMBF 6G-Life [16KISK002, 16KISQ037K]; U.S. National Science Foundation (NSF) [CCF-1908308]
  • The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as (v) secrecy leakage, and privacy leakage is measured with respect to the remote source; and (vi) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.

Subject headings and genre

Added entries (persons, corporate bodies, meetings, titles ...)

  • Schaefer, Rafael F.Tech Univ Dresden, Germany; Tech Univ Dresden, Germany (author)
  • Boche, HolgerTech Univ Munich, Germany; Tech Univ Munich, Germany; Ruhr Univ Bochum, Germany; Munich Quantum Valley MQV, Germany (author)
  • Poor, H. VincentPrinceton Univ, NJ 08544 USA (author)
  • Linköpings universitetInformationskodning (creator_code:org_t)

Related titles

  • In:IEEE Transactions on Information Forensics and Security: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC18, s. 3803-38161556-60131556-6021

Internet link

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Find more in SwePub

By the author/editor
Günlü, Onur
Schaefer, Rafael ...
Boche, Holger
Poor, H. Vincent
About the subject
ENGINEERING AND TECHNOLOGY
ENGINEERING AND ...
and Electrical Engin ...
and Telecommunicatio ...
Articles in the publication
IEEE Transaction ...
By the university
Linköping University

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view