Rate-distortion theory for secrecy systems

C Schieler, P Cuff - IEEE Transactions on Information Theory, 2014 - ieeexplore.ieee.org
secrecy that is directly inspired by rate-distortion theory. Whereas the objective in classical
rate-distortion theory is … ’s distortion for a given rate of secret key. If we relax the requirement of …

Rate-distortion theory for the Shannon cipher system

H Yamamoto - IEEE Transactions on Information Theory, 1997 - ieeexplore.ieee.org
ratedistortion problem for the SCS. In the distortionless case, it is well known, eg, see [1], that
if secret … region from the ordinary rate-distortion theorem and the known results for the SCS. …

A rate-distortion based secrecy system with side information at the decoders

EC Song, P Cuff, HV Poor - 2014 52nd Annual Allerton …, 2014 - ieeexplore.ieee.org
secrecy performance of the system is also evaluated under a distortion metric. An achievable
rate-distortion … We want to determine the rate-distortion region for a secrecy system with an …

Rate-distortion-based physical layer secrecy with applications to multimode fiber

EC Song, E Soljanin, P Cuff, HV Poor… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
… CONCLUSION In this work, we have examined the rate-distortion-based secrecy performance
of an insecure MMF communication system. The sender is assumed to have an iid source …

A rate-distortion problem for a communication system with a secondary decoder to be hindered

H Yamamoto - IEEE Transactions on Information Theory, 1988 - ieeexplore.ieee.org
… On the contrary, in this paper, we treat this as a rate-distortion problem and assume that
the secondary receiver can obtain the same information as the regular receiver. Suppose that …

Optimal equivocation in secrecy systems a special case of distortion-based characterization

P Cuff - 2013 Information Theory and Applications Workshop …, 2013 - ieeexplore.ieee.org
… We now specialize the rate-distortion theory for secrecy systems with causal disclosure to
the case of logloss payoff functions. For example, consider substituting π1 as the payoff …

The henchman problem: Measuring secrecy by the minimum distortion in a list

C Schieler, P Cuff - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
… and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is
… of 2nRL reconstruction sequences and measure secrecy by the minimum distortion over the …

Rate-Distortion-Perception Theory for Semantic Communication

J Chai, Y Xiao, G Shi, W Saad - 2023 IEEE 31st International …, 2023 - ieeexplore.ieee.org
… To address the above challenge, in this paper, we extend the Shannon’s rate-distortion
theory by taking into consideration of the constraint on the perceptual quality of semantic …

Optimal rate-distortion-leakage tradeoff for single-server information retrieval

Y Yakimenka, HY Lin, E Rosnes… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
… leakage” and “no-privacy” the optimal tradeoff can simply … ratedistortion function and as
the rate-distortion function by itself, respectively (Corollary 2). However, for intermediate privacy

[PDF][PDF] A rate-distortion approach to anonymous networking

P Venkitasubramaniam, L Tong - Proc. Allerton Conf. Commun …, 2007 - acsp.ece.cornell.edu
rate distortion, which extends beyond our scheduling strategy, and can be explained using a
general intuition. The objective of the rate-distortion … the duality to rate distortion. Further, we …