SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Poor F)
 

Sökning: WFRF:(Poor F) > Secure and Private ...

Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information

Günlü, Onur (författare)
Linköpings universitet,Informationskodning,Tekniska fakulteten
Schaefer, Rafael F. (författare)
Tech Univ Dresden, Germany; Tech Univ Dresden, Germany
Boche, Holger (författare)
Tech Univ Munich, Germany; Tech Univ Munich, Germany; Ruhr Univ Bochum, Germany; Munich Quantum Valley MQV, Germany
visa fler...
Poor, H. Vincent (författare)
Princeton Univ, NJ 08544 USA
visa färre...
 (creator_code:org_t)
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2023
2023
Engelska.
Ingår i: IEEE Transactions on Information Forensics and Security. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1556-6013 .- 1556-6021. ; 18, s. 3803-3816
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as (v) secrecy leakage, and privacy leakage is measured with respect to the remote source; and (vi) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Telekommunikation (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Telecommunications (hsv//eng)

Nyckelord

Secure and private distributed source coding; remote source; rate-limited public communication; weak eaves-dropper; passive attack

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy