The CEO Problem With Secrecy Constraints

被引:9
|
作者
Naghibi, Farshad [1 ]
Salimi, Somayeh [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, ACCESS Linnaeus Ctr, S-10044 Stockholm, Sweden
关键词
CEO problem; multiterminal source coding; secrecy constraints; eavesdropping; equivocation; RATE-DISTORTION THEORY; INFORMATION;
D O I
10.1109/TIFS.2015.2404134
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate the remote source based on the information received from the agents within a certain mean distortion threshold. The eavesdropper, with access to side information correlated to the source, is able to listen in on one of the links from the agents to the destination in order to obtain as much information as possible about the source. This problem can be viewed as the so-called CEO problem with additional secrecy constraints. We establish inner and outer bounds on the rate-distortion-equivocation region of this problem. We also obtain the region in special cases where the bounds are tight. Furthermore, we study the quadratic Gaussian case and provide the optimal rate-distortion-equivocation region when the eavesdropper has no side information and an achievable region for a more general setup with side information at the eavesdropper.
引用
收藏
页码:1234 / 1249
页数:16
相关论文
共 50 条
  • [21] Achievable rates in Gaussian MISO channels with secrecy constraints
    Shafiee, Shabnam
    Mukus, Sennur
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2466 - 2470
  • [22] Quantization for Distributed Binary Detection under Secrecy Constraints
    Mhairna, Maggie
    Duhamel, Pierre
    Piarnanida, Pablo
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [23] The Byzantine CEO Problem
    Kosut, Oliver
    Tong, Lang
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 46 - 50
  • [24] AN ALTERNATING OPTIMIZATION ALGORITHM FOR THE IMMO SECRECY CAPACITY PROBLEM UNDER SUM POWER AND PER-ANTENNA POWER CONSTRAINTS
    Li, Qiang
    Hong, Mingyi
    Wai, Hoi-To
    Ma, Wing-Kin
    Liu, Ya-Feng
    Luo, Zhi-Quan
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 4359 - 4363
  • [25] A New Scheme to Improve the Secrecy Throughput under the Constraints of Secrecy Outage Probability and Average Transmit Power
    Mu, Pengcheng
    Yang, Peizhi
    Wang, Bo
    Wang, Hui-Ming
    Yin, Qinye
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 777 - 782
  • [26] JURY SECRECY AND THE MEDIA - THE PROBLEM OF POSTVERDICT INTERVIEWS
    GOLDSTEIN, AS
    UNIVERSITY OF ILLINOIS LAW REVIEW, 1993, (02): : 295 - 314
  • [27] Performance Analysis for Relay Selection with Secrecy Constraints in Cooperative Networks
    Sheng, Yanming
    Cai, Chunxiao
    Cai, Yueming
    Yang, Weiwei
    Yang, Wendong
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2013, : 1136 - 1139
  • [28] On Transmission of a Remote Source With Secrecy Constraints Over Noisy Channels
    Naghibi, Farshad
    Salimi, Somayeh
    Skoglund, Mikael
    2014 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2014, : 746 - 749
  • [29] Combination Networks With or Without Secrecy Constraints: The Impact of Caching Relays
    Zewail, Ahmed A.
    Yener, Aylin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (06) : 1140 - 1152
  • [30] Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel
    Reboredo, Hugo
    Xavier, Joao
    Rodrigues, Miguel R. D.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (15) : 3799 - 3814