Welcome to the IKCEST

IEEE Transactions on Information Theory | Vol.62, Issue.11 | | Pages 6081-6094

IEEE Transactions on Information Theory

Secure Cascade Channel Synthesis

Paul Cuff   Sanket Satpathy  
Abstract

We consider the problem of generating correlated random variables in a distributed fashion, where communication is constrained to a cascade network. The first node in the cascade observes an i.i.d. sequence X^{n} locally before initiating communication along the cascade. All nodes share bits of common randomness that are independent of X^{n} . We consider secure synthesis—random variables produced by the system appear to be appropriately correlated and i.i.d. even to an eavesdropper who is cognizant of the communication transmissions. We characterize the optimal tradeoff between the amount of common randomness used and the required rates of communication. We find that not only does common randomness help, its usage exceeds the communication rate requirements. The most efficient scheme is based on a superposition codebook, with the first node selecting messages for all downstream nodes. We also provide a fleeting view of related problems, demonstrating how the optimal rate region may shrink or expand.

Original Text (This is the original text for your reference.)

Secure Cascade Channel Synthesis

We consider the problem of generating correlated random variables in a distributed fashion, where communication is constrained to a cascade network. The first node in the cascade observes an i.i.d. sequence X^{n} locally before initiating communication along the cascade. All nodes share bits of common randomness that are independent of X^{n} . We consider secure synthesis—random variables produced by the system appear to be appropriately correlated and i.i.d. even to an eavesdropper who is cognizant of the communication transmissions. We characterize the optimal tradeoff between the amount of common randomness used and the required rates of communication. We find that not only does common randomness help, its usage exceeds the communication rate requirements. The most efficient scheme is based on a superposition codebook, with the first node selecting messages for all downstream nodes. We also provide a fleeting view of related problems, demonstrating how the optimal rate region may shrink or expand.

+More

Cite this article
APA

APA

MLA

Chicago

Paul Cuff,Sanket Satpathy,.Secure Cascade Channel Synthesis. 62 (11),6081-6094.

Disclaimer: The translated content is provided by third-party translation service providers, and IKCEST shall not assume any responsibility for the accuracy and legality of the content.
Translate engine
Article's language
English
中文
Pусск
Français
Español
العربية
Português
Kikongo
Dutch
kiswahili
هَوُسَ
IsiZulu
Action
Recommended articles

Report

Select your report category*



Reason*



By pressing send, your feedback will be used to improve IKCEST. Your privacy will be protected.

Submit
Cancel