Allerton 2015 Paper Abstract


Paper ThB4.1

Asoodeh, Shahab (Queen's University), Alajaji, Fady (Queen's University), Linder, Tamas (Queen's University)

Lossless Secure Source Coding: Yamamoto’s Setting

Scheduled for presentation during the Regular Session "Information Theory III" (ThB4), Thursday, October 1, 2015, 10:30−10:50, Pine

53rd Annual Allerton Conference on Communication, Control, and Computing, Sept 29-Oct 2, 2015, Allerton Park and Retreat Center, Monticello, IL, USA

This information is tentative and subject to change. Compiled on December 5, 2021

Keywords Information Theory


Given a private source of information, X and a public correlated source, Y, we study the problem of encoding the two-dimensional source (X; Y) into an index J such that a remote party, knowing J and some external side information Z, can losslessly recover Y while any eavesdropper knowing J and possibly a correlated side information E can retrieve very little information about X. We give general converse results for the amount of information about X that might be leaked in such systems and also achievability results that are optimal in some special cases.



All Content © PaperCept, Inc..

This site is protected by copyright and trademark laws under US and International law.
All rights reserved. © 2002-2021 PaperCept, Inc.
Page generated 2021-12-05  08:48:24 PST  Terms of use