Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IEEE Transactions on...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
IEEE Transactions on Information Theory
Article . 2016 . Peer-reviewed
License: IEEE Copyright
Data sources: Crossref
versions View all 1 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Secure Cooperative Source-Coding With Side Information at the Eavesdropper

Authors: Shraga I. Bross;

Secure Cooperative Source-Coding With Side Information at the Eavesdropper

Abstract

In the secure cooperative source-coding problem that we consider, Encoder 1 and Decoder 1 observe, respectively, a pair of independent identically distributed (i.i.d.) correlated sources and wish to communicate the first source to Decoder 2 subject to a distortion constraint. Encoder 1 sends a message to both the decoders over a public nonsecure channel, and then Decoder 1—the helper—sends a message just to Decoder 2 over a secure channel. An eavesdropper, which has access to memoryless side-information that is correlated with the first source, intercepts the message sent by Encoder 1 and based on both wishes to minimize its uncertainty about the first source. The secrecy measure of the system is the equivocation of the first source at the eavesdropper. We determine the rates equivocation region for this problem assuming that conditioned on the side-information of Decoder 1 the eavesdropper’s side-information is independent of the first source. To that end, we derive an inner and an outer bound that depend explicitly on the proportional rate that Encoder 1 spends in the cooperation process. Subsequently, we evaluate this region for the case of a doubly symmetric binary source and Hamming distortion.

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    6
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
6
Top 10%
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!