paul cuff the source coding side of secrecy texpoint fonts used in emf. read the texpoint manual...
TRANSCRIPT
![Page 1: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/1.jpg)
Paul Cuff
THE SOURCE CODING SIDE OF SECRECY
![Page 2: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/2.jpg)
Game Theoretic Secrecy
• Motivating Problem
• Mixed Strategy• Non-deterministic
• Requires randomdecoder• Dual to wiretap channel
Encoder
Communication
leakage
Eavesdropping
Zero-sumRepeated
Game
Player 1
Player 2
State
![Page 3: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/3.jpg)
Main Topics of this Talk
• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions
2. Relax Requirements to “close in total variation”
3. Main Tool --- Reverse Channel Encoder
4. Easy Analysis of Optimal Adversary
X n > B
![Page 4: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/4.jpg)
Restate Problem---Example 1 (RD Theory)
• Can we design:
such that
• Does there exists a distribution:
Standard Existence of Distributions
f g
![Page 5: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/5.jpg)
Restate Problem---Example 2 (Secrecy)
• Can we design:
such that
• Does there exists a distribution:
Standard Existence of Distributions
f g
Eve
Score
[Cuff 10]
![Page 6: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/6.jpg)
Tricks with Total Variation
• Technique• Find a distribution p1 that is easy to analyze and satisfies the
relaxed constraints.
• Construct p2 to satisfy the hard constraints while maintaining small total variation distance to p1.
How?
Property 1:
![Page 7: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/7.jpg)
Tricks with Total Variation
• Technique• Find a distribution p1 that is easy to analyze and satisfies the
relaxed constraints.
• Construct p2 to satisfy the hard constraints while maintaining small total variation distance to p1.
Why?
Property 2 (bounded functions):
![Page 8: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/8.jpg)
Summary• Achievability Proof Techniques:
1. Pose problems in terms of existence of joint distributions
2. Relax Requirements to “close in total variation”
3. Main Tool --- Reverse Channel Encoder
4. Easy Analysis of Optimal Adversary
• Secrecy Example: For arbitrary ², does there exist a distribution satisfying:
![Page 9: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/9.jpg)
Cloud Overlap Lemma• Previous Encounters• Wyner, 75 --- used divergence• Han-Verdú, 93 --- general channels, used total variation• Cuff 08, 09, 10, 11 --- provide simple proof and utilize for
secrecy encoding
PX|U(x|u)
Memoryless Channel
![Page 10: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/10.jpg)
Reverse Channel Encoder
• For simplicity, ignore the key K, and consider Ja to be the part of the message that the adversary obtains. (i.e. J = (Ja, Js), and ignore Js for now)
• Construct a joint distribution between the source Xn and the information Ja (revealed to the Adversary) using a memoryless channel.
PX|U(x|u)
Memoryless Channel
![Page 11: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/11.jpg)
Simple Analysis• This encoder yields a very simple analysis and convenient properties
1. If |Ja| is large enough, then Xn will be nearly i.i.d. in total variation
2. Performance:
PX|U(x|u)
Memoryless Channel
![Page 12: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA](https://reader036.vdocument.in/reader036/viewer/2022062322/56649cc95503460f949914fc/html5/thumbnails/12.jpg)
Summary
• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions
2. Relax Requirements to “close in total variation”
3. Main Tool --- Reverse Channel Encoder
4. Easy Analysis of Optimal Adversary
X n > B