The CEO Problem With Secrecy Constraints

被引:9
|
作者
Naghibi, Farshad [1 ]
Salimi, Somayeh [1 ]
Skoglund, Mikael [1 ]
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, ACCESS Linnaeus Ctr, S-10044 Stockholm, Sweden
关键词
CEO problem; multiterminal source coding; secrecy constraints; eavesdropping; equivocation; RATE-DISTORTION THEORY; INFORMATION;
D O I
10.1109/TIFS.2015.2404134
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate the remote source based on the information received from the agents within a certain mean distortion threshold. The eavesdropper, with access to side information correlated to the source, is able to listen in on one of the links from the agents to the destination in order to obtain as much information as possible about the source. This problem can be viewed as the so-called CEO problem with additional secrecy constraints. We establish inner and outer bounds on the rate-distortion-equivocation region of this problem. We also obtain the region in special cases where the bounds are tight. Furthermore, we study the quadratic Gaussian case and provide the optimal rate-distortion-equivocation region when the eavesdropper has no side information and an achievable region for a more general setup with side information at the eavesdropper.
引用
收藏
页码:1234 / 1249
页数:16
相关论文
共 50 条
  • [31] Multi-User MIMO Satellite Communications with Secrecy Constraints
    Schraml, Matthias G.
    Knopp, Andreas
    Storek, Kai-Uwe
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [32] Rate Regions for Multiple Access Channel With Conference and Secrecy Constraints
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 1961 - 1974
  • [33] Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints
    Nadendla, V. Sriram Siddhardh
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2016, 64 (10) : 2636 - 2648
  • [34] Power Allocation for Estimation Outage Minimization with Secrecy Outage Constraints
    Guo, Xiaoxi
    Leong, Alex S.
    Dey, Subhrakanti
    2016 AUSTRALIAN COMMUNICATIONS THEORY WORKSHOP (AUSCTW), 2016, : 71 - 76
  • [35] Maximum Secrecy Throughput of MIMOME FSO Communications With Outage Constraints
    Pivaro Monteiro, Marcos Eduardo
    Rebelatto, Joao Luiz
    Souza, Richard Demo
    Brante, Glauber
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (05) : 3487 - 3497
  • [36] Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints
    Gunlu, Onur
    ENTROPY, 2022, 24 (01)
  • [37] Wireless Caching Helper System with Heterogeneous Traffic and Secrecy Constraints
    Smpokos, Georgios
    Pappas, Nikolaos
    Chen, Zheng
    Mohapatra, Parthajit
    2019 IEEE 20TH INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS (SPAWC 2019), 2019,
  • [38] Antenna Selection With Erroneous Covariance Matrices Under Secrecy Constraints
    Hanif, Muhammad Fainan
    Juntti, Markku
    Tran, Le-Nam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (01) : 414 - 420
  • [39] Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints
    Truong Xuan Quach
    Hung Tran
    Uhlemann, Elisabeth
    Mai Tran Truc
    IEEE ACCESS, 2020, 8 : 18442 - 18455
  • [40] On the Vector Gaussian CEO Problem
    Chen, Jun
    Wang, Jia
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,