Secure Multiterminal Source Coding With Actions

This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to comp...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings / IEEE International Symposium on Information Theory pp. 2174 - 2178
Main Authors: Lu, Jian, Xu, Yinfei, Zhang, Ping, Wang, Qiao
Format: Conference Proceeding
Language:English
Published: IEEE 01.07.2019
Subjects:
ISSN:2157-8117
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to compress this source losslessly to the decoder. A passive eavesdropper having access to the side information Z n can observe the information bits sent by the main encoder. In this scenario, the decoder is allowed to choose actions affecting the correlated source Y n and the side information Z n . For this problem, we characterize the optimal rate-distortion-cost-leakage region for a discrete memoryless setting.
AbstractList This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to compress this source losslessly to the decoder. A passive eavesdropper having access to the side information Z n can observe the information bits sent by the main encoder. In this scenario, the decoder is allowed to choose actions affecting the correlated source Y n and the side information Z n . For this problem, we characterize the optimal rate-distortion-cost-leakage region for a discrete memoryless setting.
Author Wang, Qiao
Lu, Jian
Xu, Yinfei
Zhang, Ping
Author_xml – sequence: 1
  givenname: Jian
  surname: Lu
  fullname: Lu, Jian
  organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China
– sequence: 2
  givenname: Yinfei
  surname: Xu
  fullname: Xu, Yinfei
  organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China
– sequence: 3
  givenname: Ping
  surname: Zhang
  fullname: Zhang, Ping
  organization: School of Computer and Information, Anhui Polytechnic University, Wuhu, 241000, China
– sequence: 4
  givenname: Qiao
  surname: Wang
  fullname: Wang, Qiao
  organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China
BookMark eNotz71OwzAUQGGDikRTeADEkhdIeu91nNhjFUGJVNQhkRgr17kGozRB-Rl4ewY6ne2TTiRW_dCzEE8IKSKYbVVXTUqAJtU6M7mmGxGhkjo3ZBBuxZpQFYlGLO5FNE3fALKQQGuxrdktI8fvSzeHmcdL6G0X18MyOo7LoQ39Z_wR5q945-Yw9NODuPO2m_jx2o1oXl-a8i05HPdVuTskgUDOiSapGa1XfAZnNHtSpKzMdetR0RnI-ZYYbOGBEVzGLavMSFPIHDKFciOe_9nAzKefMVzs-Hu6vsk_LDxDzw
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ISIT.2019.8849682
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1538692910
9781538692912
EISSN 2157-8117
EndPage 2178
ExternalDocumentID 8849682
Genre orig-research
GroupedDBID 6IE
6IH
6IK
6IL
6IN
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i203t-8238e1af5eb0c98ef2525a368df152b02cfd2e0a7f0e10c4ede5493973604513
IEDL.DBID RIE
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000489100302054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 08:29:31 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-8238e1af5eb0c98ef2525a368df152b02cfd2e0a7f0e10c4ede5493973604513
PageCount 5
ParticipantIDs ieee_primary_8849682
PublicationCentury 2000
PublicationDate 2019-July
PublicationDateYYYYMMDD 2019-07-01
PublicationDate_xml – month: 07
  year: 2019
  text: 2019-July
PublicationDecade 2010
PublicationTitle Proceedings / IEEE International Symposium on Information Theory
PublicationTitleAbbrev ISIT
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0037302
Score 1.6924908
Snippet This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically...
SourceID ieee
SourceType Publisher
StartPage 2174
SubjectTerms Decoding
Distortion
Indexes
Memoryless systems
Source coding
Zinc
Title Secure Multiterminal Source Coding With Actions
URI https://ieeexplore.ieee.org/document/8849682
WOSCitedRecordID wos000489100302054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5q8eCpaiu-2YNHYzbZPCZHKRZ7KYUG7K1sshMMSCNt6u93H2lF8OJtWViW2cd8uzPzzQA86LusUBrLPRJ6kSgKrQej2JOJjOKo0gBUcltsIp3NcLnM5j14PHBhiMgGn9GTaVpfvmrKnTGV-YhRlqBWuEdpmjiu1l7rCn1Sw85rGfDMny6muQncMifBDvpVPcWCx2Twv2lPYfTDwmPzA76cQY_W5zDYl2Fg3a0cgm9t5sQcl9YFt3ywhbXKs3FjBrO3un1nz5bDsB1BPnnJx69eVwfBq0MuWg81rFIgq5gKXmZIVRiHsRQJqkqjb8HDslIhcZlWnAJeRqRI__r0Q0MkJnuMuID-ulnTJTCj-lAgujxbCUohUyVRSSEMQxWvYGjEX326TBerTvLrv7tv4MSssAtevYV-u9nRHRyXX2293dzb7fkGRPqP8w
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5KFfRUtRXf5uDRtWmS3c4eRSwt1lLogr2V7GYWC9JKu_X3m2S3FcGLtxAIYfKYL5mZbwbgzt5lg9pZ7pEwUDJNrR5UYaAjrUKVWwDKuC820R2NcDqNxzW433FhiMgHn9GDa3pfvllmG2cqayOqOEKrcPdCpQQv2VpbvSvtWRWV37LD4_ZgMkhc6JY7C37Yr_opHj56jf9NfAStHx4eG-8Q5hhqtDiBxrYQA6vuZRPa3mpOrGTTluEtH2zi7fLsaekGs7d58c4ePYth3YKk95w89YOqEkIwF1wWAVpgpY7OQ0p5FiPlIhShlhGa3OJvykWWG0Fcd3NOHZ4pMmT_ffapISOXP0aeQn2xXNAZMKf8UCKWmbYi1FJ3jUajpXQcVTyHphN_9lnmuphVkl_83X0LB_3kdTgbDkYvl3DoVrsMZb2CerHa0DXsZ1_FfL268Vv1DfV6kzo
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+%2F+IEEE+International+Symposium+on+Information+Theory&rft.atitle=Secure+Multiterminal+Source+Coding+With+Actions&rft.au=Lu%2C+Jian&rft.au=Xu%2C+Yinfei&rft.au=Zhang%2C+Ping&rft.au=Wang%2C+Qiao&rft.date=2019-07-01&rft.pub=IEEE&rft.eissn=2157-8117&rft.spage=2174&rft.epage=2178&rft_id=info:doi/10.1109%2FISIT.2019.8849682&rft.externalDocID=8849682