paul cuff the source coding side of secrecy texpoint fonts used in emf. read the texpoint manual...

12
Paul Cuff THE SOURCE CODING SIDE OF SECRECY

Upload: isabel-york

Post on 15-Jan-2016

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Paul Cuff

THE SOURCE CODING SIDE OF SECRECY

Page 2: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Game Theoretic Secrecy

• Motivating Problem

• Mixed Strategy• Non-deterministic

• Requires randomdecoder• Dual to wiretap channel

Encoder

Communication

leakage

Eavesdropping

Zero-sumRepeated

Game

Player 1

Player 2

State

Page 3: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Main Topics of this Talk

• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions

2. Relax Requirements to “close in total variation”

3. Main Tool --- Reverse Channel Encoder

4. Easy Analysis of Optimal Adversary

X n > B

Page 4: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Restate Problem---Example 1 (RD Theory)

• Can we design:

such that

• Does there exists a distribution:

Standard Existence of Distributions

f g

Page 5: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Restate Problem---Example 2 (Secrecy)

• Can we design:

such that

• Does there exists a distribution:

Standard Existence of Distributions

f g

Eve

Score

[Cuff 10]

Page 6: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Tricks with Total Variation

• Technique• Find a distribution p1 that is easy to analyze and satisfies the

relaxed constraints.

• Construct p2 to satisfy the hard constraints while maintaining small total variation distance to p1.

How?

Property 1:

Page 7: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Tricks with Total Variation

• Technique• Find a distribution p1 that is easy to analyze and satisfies the

relaxed constraints.

• Construct p2 to satisfy the hard constraints while maintaining small total variation distance to p1.

Why?

Property 2 (bounded functions):

Page 8: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Summary• Achievability Proof Techniques:

1. Pose problems in terms of existence of joint distributions

2. Relax Requirements to “close in total variation”

3. Main Tool --- Reverse Channel Encoder

4. Easy Analysis of Optimal Adversary

• Secrecy Example: For arbitrary ², does there exist a distribution satisfying:

Page 9: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Cloud Overlap Lemma• Previous Encounters• Wyner, 75 --- used divergence• Han-Verdú, 93 --- general channels, used total variation• Cuff 08, 09, 10, 11 --- provide simple proof and utilize for

secrecy encoding

PX|U(x|u)

Memoryless Channel

Page 10: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Reverse Channel Encoder

• For simplicity, ignore the key K, and consider Ja to be the part of the message that the adversary obtains. (i.e. J = (Ja, Js), and ignore Js for now)

• Construct a joint distribution between the source Xn and the information Ja (revealed to the Adversary) using a memoryless channel.

PX|U(x|u)

Memoryless Channel

Page 11: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Simple Analysis• This encoder yields a very simple analysis and convenient properties

1. If |Ja| is large enough, then Xn will be nearly i.i.d. in total variation

2. Performance:

PX|U(x|u)

Memoryless Channel

Page 12: Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA

Summary

• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions

2. Relax Requirements to “close in total variation”

3. Main Tool --- Reverse Channel Encoder

4. Easy Analysis of Optimal Adversary

X n > B