We extend the problem of secure source coding by considering a remote source whose noisy measurements are correlated random variables used for secure source reconstruction. The main additions to the problem are as follows: (1) all terminals noncausally observe a noisy measurement of the remote source; (2) a private key is available to all legitimate terminals; (3) the public communication link between the encoder and decoder is rate-limited; and (4) the secrecy leakage to the eavesdropper is measured with respect to the encoder input, whereas the privacy leakage is measured with respect to the remote source. Exact rate regions are characterized for a lossy source coding problem with a private key, remote source, and decoder side information...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
International audienceIn this work, we investigate two secure source coding models, a Helper problem...
We extend the problem of secure source coding by considering a remote source whose noisy measurement...
The problem of secure source coding with multiple terminals is extended by considering a remote sour...
The distributed source coding problem is extended by positing that noisy measurements of a remote so...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
International audienceThe problem of secure multiterminal source coding with side information at the...
A lossy source coding problem is studied in which a source encoder communicates with two decoders, o...
Abstract—Given a private source of information, Xn and a public correlated source, Y n, we study the...
Secure data compression in the presence of side information at both a legitimate receiver and an eav...
openThe key reconciliation stage in the secret key generation process may leak partial information t...
International audienceIn this work, we investigate two source coding models, a \emph{Helper} problem...
Abstract—Secret key generation by multiple terminals is consid-ered based on their observations of j...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
International audienceIn this work, we investigate two secure source coding models, a Helper problem...
We extend the problem of secure source coding by considering a remote source whose noisy measurement...
The problem of secure source coding with multiple terminals is extended by considering a remote sour...
The distributed source coding problem is extended by positing that noisy measurements of a remote so...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
International audienceThe problem of secure multiterminal source coding with side information at the...
A lossy source coding problem is studied in which a source encoder communicates with two decoders, o...
Abstract—Given a private source of information, Xn and a public correlated source, Y n, we study the...
Secure data compression in the presence of side information at both a legitimate receiver and an eav...
openThe key reconciliation stage in the secret key generation process may leak partial information t...
International audienceIn this work, we investigate two source coding models, a \emph{Helper} problem...
Abstract—Secret key generation by multiple terminals is consid-ered based on their observations of j...
The problem of reliable function computation is extended by imposing privacy, secrecy, and storage c...
International audienceThis paper investigates the problem of source-channel coding for secure transm...
This paper investigates the problem of secret key generation over a wiretap channel when the termina...
International audienceIn this work, we investigate two secure source coding models, a Helper problem...