Secure Multiterminal Source Coding With Actions
This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to comp...
Saved in:
| Published in: | Proceedings / IEEE International Symposium on Information Theory pp. 2174 - 2178 |
|---|---|
| Main Authors: | , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.07.2019
|
| Subjects: | |
| ISSN: | 2157-8117 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to compress this source losslessly to the decoder. A passive eavesdropper having access to the side information Z n can observe the information bits sent by the main encoder. In this scenario, the decoder is allowed to choose actions affecting the correlated source Y n and the side information Z n . For this problem, we characterize the optimal rate-distortion-cost-leakage region for a discrete memoryless setting. |
|---|---|
| AbstractList | This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically distributed (i.i.d.) source X n and wishes to compress this source lossyly to the decoder. Another encoder observes the source Y n and wants to compress this source losslessly to the decoder. A passive eavesdropper having access to the side information Z n can observe the information bits sent by the main encoder. In this scenario, the decoder is allowed to choose actions affecting the correlated source Y n and the side information Z n . For this problem, we characterize the optimal rate-distortion-cost-leakage region for a discrete memoryless setting. |
| Author | Wang, Qiao Lu, Jian Xu, Yinfei Zhang, Ping |
| Author_xml | – sequence: 1 givenname: Jian surname: Lu fullname: Lu, Jian organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China – sequence: 2 givenname: Yinfei surname: Xu fullname: Xu, Yinfei organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China – sequence: 3 givenname: Ping surname: Zhang fullname: Zhang, Ping organization: School of Computer and Information, Anhui Polytechnic University, Wuhu, 241000, China – sequence: 4 givenname: Qiao surname: Wang fullname: Wang, Qiao organization: School of Information Science and Engineering, Southeast University, Nanjing, 210096, China |
| BookMark | eNotz71OwzAUQGGDikRTeADEkhdIeu91nNhjFUGJVNQhkRgr17kGozRB-Rl4ewY6ne2TTiRW_dCzEE8IKSKYbVVXTUqAJtU6M7mmGxGhkjo3ZBBuxZpQFYlGLO5FNE3fALKQQGuxrdktI8fvSzeHmcdL6G0X18MyOo7LoQ39Z_wR5q945-Yw9NODuPO2m_jx2o1oXl-a8i05HPdVuTskgUDOiSapGa1XfAZnNHtSpKzMdetR0RnI-ZYYbOGBEVzGLavMSFPIHDKFciOe_9nAzKefMVzs-Hu6vsk_LDxDzw |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/ISIT.2019.8849682 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 1538692910 9781538692912 |
| EISSN | 2157-8117 |
| EndPage | 2178 |
| ExternalDocumentID | 8849682 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IH 6IK 6IL 6IN AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP OCL RIE RIL RIO |
| ID | FETCH-LOGICAL-i203t-8238e1af5eb0c98ef2525a368df152b02cfd2e0a7f0e10c4ede5493973604513 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000489100302054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 08:29:31 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i203t-8238e1af5eb0c98ef2525a368df152b02cfd2e0a7f0e10c4ede5493973604513 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_8849682 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-July |
| PublicationDateYYYYMMDD | 2019-07-01 |
| PublicationDate_xml | – month: 07 year: 2019 text: 2019-July |
| PublicationDecade | 2010 |
| PublicationTitle | Proceedings / IEEE International Symposium on Information Theory |
| PublicationTitleAbbrev | ISIT |
| PublicationYear | 2019 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0037302 |
| Score | 1.6924908 |
| Snippet | This paper studies the secure multiterminal source coding problem with actions. In particular, one main encoder observes an independent and identically... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 2174 |
| SubjectTerms | Decoding Distortion Indexes Memoryless systems Source coding Zinc |
| Title | Secure Multiterminal Source Coding With Actions |
| URI | https://ieeexplore.ieee.org/document/8849682 |
| WOSCitedRecordID | wos000489100302054&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEB5q8eCpaiu-2YNHYzbZPCZHKRZ7KYUG7K1sshMMSCNt6u93H2lF8OJtWViW2cd8uzPzzQA86LusUBrLPRJ6kSgKrQej2JOJjOKo0gBUcltsIp3NcLnM5j14PHBhiMgGn9GTaVpfvmrKnTGV-YhRlqBWuEdpmjiu1l7rCn1Sw85rGfDMny6muQncMifBDvpVPcWCx2Twv2lPYfTDwmPzA76cQY_W5zDYl2Fg3a0cgm9t5sQcl9YFt3ywhbXKs3FjBrO3un1nz5bDsB1BPnnJx69eVwfBq0MuWg81rFIgq5gKXmZIVRiHsRQJqkqjb8HDslIhcZlWnAJeRqRI__r0Q0MkJnuMuID-ulnTJTCj-lAgujxbCUohUyVRSSEMQxWvYGjEX326TBerTvLrv7tv4MSssAtevYV-u9nRHRyXX2293dzb7fkGRPqP8w |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5KFfRUtRXf5uDRtWmS3c4eRSwt1lLogr2V7GYWC9JKu_X3m2S3FcGLtxAIYfKYL5mZbwbgzt5lg9pZ7pEwUDJNrR5UYaAjrUKVWwDKuC820R2NcDqNxzW433FhiMgHn9GDa3pfvllmG2cqayOqOEKrcPdCpQQv2VpbvSvtWRWV37LD4_ZgMkhc6JY7C37Yr_opHj56jf9NfAStHx4eG-8Q5hhqtDiBxrYQA6vuZRPa3mpOrGTTluEtH2zi7fLsaekGs7d58c4ePYth3YKk95w89YOqEkIwF1wWAVpgpY7OQ0p5FiPlIhShlhGa3OJvykWWG0Fcd3NOHZ4pMmT_ffapISOXP0aeQn2xXNAZMKf8UCKWmbYi1FJ3jUajpXQcVTyHphN_9lnmuphVkl_83X0LB_3kdTgbDkYvl3DoVrsMZb2CerHa0DXsZ1_FfL268Vv1DfV6kzo |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Proceedings+%2F+IEEE+International+Symposium+on+Information+Theory&rft.atitle=Secure+Multiterminal+Source+Coding+With+Actions&rft.au=Lu%2C+Jian&rft.au=Xu%2C+Yinfei&rft.au=Zhang%2C+Ping&rft.au=Wang%2C+Qiao&rft.date=2019-07-01&rft.pub=IEEE&rft.eissn=2157-8117&rft.spage=2174&rft.epage=2178&rft_id=info:doi/10.1109%2FISIT.2019.8849682&rft.externalDocID=8849682 |