An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Semantic-security capacity for wiretap channels of type II

Z Goldfeld, P Cuff, HH Permuter - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is
currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to …

The likelihood encoder for lossy compression

EC Song, P Cuff, HV Poor - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
A likelihood encoder is studied in the context of lossy source compression. The analysis of
the likelihood encoder is based on the soft-covering lemma. It is demonstrated that the use …

Conditional rate-distortion-perception trade-off

X Niu, D Gündüz, B Bai, W Han - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Recent advances in machine learning-aided lossy compression are incorporating
perceptual fidelity into the rate-distortion theory. In this paper, we study the rate-distortion …

Secrecy by design with applications to privacy and compression

YY Shkel, RS Blum, HV Poor - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Secrecy by design is examined as an approach to information-theoretic secrecy. The main
idea behind this approach is to design an information processing system from the ground up …

An efficient difference-of-convex solver for privacy funnel

TH Huang, H El Gamal - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
We propose an efficient solver for the privacy funnel (PF) method, leveraging its difference-of-
convex (DC) structure. The proposed DC separation results in a closed-form update …

A compression perspective on secrecy measures

YY Shkel, HV Poor - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
The relationships among secrecy, compression rate and shared secret key rate in lossless
data compression are studied through the lenses of perfect secrecy, mutual information …

Information design for strategic coordination of autonomous devices with non-aligned utilities

M Le Treust, T Tomala - 2016 54th Annual Allerton Conference …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the coordination of autonomous devices with non-aligned utility
functions. Both encoder and decoder are considered as players, that choose the encoding …

Operational definitions for some common information leakage metrics

I Issa, AB Wagner - 2017 IEEE International Symposium on …, 2017 - ieeexplore.ieee.org
Maximal leakage from a random variable X to a random variable Y is defined as the
multiplicative increase, upon observing Y, of the probability of correctly guessing a …

Gaussian secure source coding and wyner's common information

S Satpathy, P Cuff - 2015 IEEE International Symposium on …, 2015 - ieeexplore.ieee.org
We study secure source-coding with causal disclosure, under the Gaussian distribution. The
optimality of Gaussian auxiliary random variables is shown in various scenarios. We …