The Henchman problem: Measuring secrecy by the minimum distortion in a list

Type: Article

Publication Date: 2014-06-01

Citations: 11

DOI: https://doi.org/10.1109/isit.2014.6874902

Download PDF

Abstract

We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this work we suppose that an eavesdropper produces a list of 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">nRL</sup> reconstruction sequences and measure secrecy by the minimum distortion over the entire list.We show that this setting is equivalent to one in which an eavesdropper must reconstruct a single sequence, but also receives side information about the source sequence and public message from a rate-limited henchman. We characterize the optimal tradeoff of secret key rate, list rate, and eavesdropper distortion. The solution hinges on a problem of independent interest: lossy compression of a codeword drawn uniformly from a random codebook.

Locations

  • arXiv (Cornell University) - View - PDF

Similar Works

Action Title Year Authors
+ The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List 2016 Curt Schieler
Paul Cuff
+ The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List 2014 Curt Schieler
Paul Cuff
+ The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List 2014 Curt Schieler
Paul Cuff
+ Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security 2015 Flávio P. Calmon
Muriel Médard
Mayank Varia
Ken R. Duffy
Mark M. Christiansen
Linda Zeger
+ PDF Chat Lists that are smaller than their parts: A coding approach to tunable secrecy 2012 Flávio P. Calmon
Muriel Médard
Linda Zeger
João Barros
Mark M. Christiansen
Ken R. Duffy
+ Lists that are smaller than their parts: A coding approach to tunable secrecy 2012 Flávio P. Calmon
Muriel Médard
Linda Zeger
João Barros
Mark M. Christiansen
Ken R. Duffy
+ Lists that are smaller than their parts: A coding approach to tunable secrecy 2012 Flávio P. Calmon
Muriel Médard
Linda Zeger
João Barros
Mark M. Christiansen
Ken R. Duffy
+ PDF Chat Source-Channel Secrecy for Shannon Cipher System 2017 Lei Yu
Houqiang Li
Weiping Li
+ PDF Chat Source-channel secrecy for Shannon cipher system 2016 Lei Yu
Houqiang Li
Weiping Li
+ Source-Channel Secrecy for Shannon Cipher System 2016 Lei Yu
Houqiang Li
Weiping Li
+ Measuring Secrecy by the Probability of a Successful Guess 2017 Ibrahim Issa
Aaron B. Wagner
+ PDF Chat Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective 2021 Yucheng Liu
Lawrence Ong
Sarah J. Johnson
Jörg Kliewer
Parastoo Sadeghi
Phee Lep Yeoh
+ Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective 2021 Yucheng Liu
Lawrence Ong
Sarah J. Johnson
Jörg Kliewer
Parastoo Sadeghi
Phee Lep Yeoh
+ Private Variable-Length Coding with Non-zero Leakage 2023 Amirreza Zamani
Tobias J. Oechtering
Mikael Skoglund
+ PDF Chat Rate-distortion theory for secrecy systems 2013 Curt Schieler
Paul Cuff
+ On the Shannon cipher system with a capacity-limited key-distribution channel 2005 Neri Merhav
+ PDF Chat On the shannon cipher system with a capacity-limited key-distribution channel 2006 Neri Merhav
+ PDF Chat Perfectly secure encryption of individual sequences 2012 Neri Merhav
+ Perfectly secure encryption of individual sequences 2011 Neri Merhav
+ The coding theorem for the Shannon cipher system with a guessing wiretapper and correlated sources 2005 Yutaka Hayashi
H. Yamamoto