The CEO Problem With Secrecy Constraints

被引:9
|
作者
Naghibi, Farshad [1 ]
Salimi, Somayeh [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, ACCESS Linnaeus Ctr, S-10044 Stockholm, Sweden
关键词
CEO problem; multiterminal source coding; secrecy constraints; eavesdropping; equivocation; RATE-DISTORTION THEORY; INFORMATION;
D O I
10.1109/TIFS.2015.2404134
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate the remote source based on the information received from the agents within a certain mean distortion threshold. The eavesdropper, with access to side information correlated to the source, is able to listen in on one of the links from the agents to the destination in order to obtain as much information as possible about the source. This problem can be viewed as the so-called CEO problem with additional secrecy constraints. We establish inner and outer bounds on the rate-distortion-equivocation region of this problem. We also obtain the region in special cases where the bounds are tight. Furthermore, we study the quadratic Gaussian case and provide the optimal rate-distortion-equivocation region when the eavesdropper has no side information and an achievable region for a more general setup with side information at the eavesdropper.
引用
收藏
页码:1234 / 1249
页数:16
相关论文
共 50 条
  • [1] The CEO Problem with Secrecy Constraints
    Naghibi, Farshad
    Salimi, Somayeh
    Skoglund, Mikael
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 756 - 760
  • [2] Outer Bounds on the CEO Problem With Privacy Constraints
    Yachongka, Vamoua
    Yagi, Hideki
    Ochiai, Hideki
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1566 - 1581
  • [3] Networking with secrecy constraints
    Venkitasubramaniam, Parvathinathan
    He, Ting
    Tong, Lang
    MILCOM 2006, VOLS 1-7, 2006, : 3439 - +
  • [4] The Problem of Secrecy
    Palfrey, John Gorham
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1953, 290 : 90 - 99
  • [5] On Edge Caching with Secrecy Constraints
    Gabry, Frederic
    Bioglio, Valerio
    Land, Ingmar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [6] Designing Scalar Quantizers with Secrecy Constraints
    Almeida, Joao
    Maierbacher, Gerhard
    Barros, Joao
    2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 237 - 240
  • [7] On Function Computation With Privacy and Secrecy Constraints
    Tu, Wenwen
    Lai, Lifeng
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) : 6716 - 6733
  • [8] Multilevel Diversity Coding with Secrecy Constraints
    Balasubramanian, A.
    Liu, Tie
    Miller, Scott L.
    2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2009, : 213 - 216
  • [9] The CEO problem
    Berger, T
    Zhang, Z
    Viswanathan, H
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (03) : 887 - 902
  • [10] Cognitive radio network with secrecy and interference constraints
    Hung Tran
    Kaddoum, Georges
    Gagnon, Francois
    Sibomana, Louis
    PHYSICAL COMMUNICATION, 2017, 22 : 32 - 41