Skip navigation
Please use this identifier to cite or link to this item:
Title: Rate-Distortion Theory for Secrecy Systems
Authors: Schieler, Curt
Advisors: Cuff, Paul
Contributors: Electrical Engineering Department
Keywords: information theory
lossy compression
source coding
Subjects: Electrical engineering
Issue Date: 2014
Publisher: Princeton, NJ : Princeton University
Abstract: The purpose of any communication system is to ensure reliable transmission of data from a sender to a receiver. An important secondary goal is to suitably encrypt the data so that an eavesdropper cannot glean any useful information from the communication. From an information-theoretic point of view, an ideal secure communication system ensures that an eavesdropper's observations are statistically independent of the information source. Unfortunately, a prohibitively large amount of shared secret key is necessary to guarantee such perfect secrecy. This prompts a natural question: if perfect secrecy is relaxed in order to ease the key requirement, then what is a good measure of "imperfect" secrecy? One of the successes of information theory has been to establish fundamental limits of lossy data compression through the use of rate-distortion theory. In rate-distortion theory, the receiver is allowed some loss in reproducing the source in order to reduce the compression ratio; the goal is to find the optimal tradeoff between the rate of compression and the receiver's distortion. This thesis explores the consequences of applying the rate-distortion paradigm to the problem of measuring imperfect secrecy in a communication system. In particular, the key question is: what is the optimal tradeoff between the rate of secret key and the distortion that an eavesdropper suffers in trying to reconstruct the source? It turns out that distortion-based measures of security are most appropriate in settings where the eavesdropper is assumed to have additional side information about the source. This thesis examines two such settings. In the first setting, the eavesdropper is able to view the past behavior of various parts of the communication system and update his actions accordingly. In the second setting, the eavesdropper receives rate-limited communication from an omniscient assistant. This thesis characterizes the optimal information-theoretic tradeoff between the key rate and the eavesdropper's distortion for general versions of both settings.
Alternate format: The Mudd Manuscript Library retains one bound copy of each dissertation. Search for these copies in the library's main catalog
Type of Material: Academic dissertations (Ph.D.)
Language: en
Appears in Collections:Electrical Engineering

Files in This Item:
File Description SizeFormat 
Schieler_princeton_0181D_11172.pdf1.27 MBAdobe PDFView/Download

Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.