Communication with secrecy constraints

  • Authors:
  • Alon Orlitsky;Abbas El Gamal

  • Affiliations:
  • -;-

  • Venue:
  • STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
  • Year:
  • 1984

Quantified Score

Hi-index 0.00

Visualization

Abstract

Let x, y, z be finite sets, X,Y random variables uniformly distributed over x×y, f a function from x×y to Z and 0≤&egr;&le1. A person PX knows X and a person PY knows Y and they want to exchange X and Y. An eavesdropper who knows their protocol listens to their communication in order to obtain information about f(X, Y). PX and PY want to ensure that for every value (x,y) of (X,Y) the eavesdropper's a priori and a posteriori probabilities of {f(X,Y)&equil;j} are &egr;-close for all j. Therefore, they encrypt some of the transmitted bits. The problem is to find a protocol that minimizes the number of bits encrypted in the worst case. Two kinds of protocols are considered: deterministic and randomized. For deterministic protocols it is shown that for all x,y, Boolean f (|Z|&equil;2) and &egr;0, there exists a protocol that requires no more than 2• log(1/&egr;) + 16 bits. An example where log(1/&egr;) − 1 bits must be encrypted is given. For K valued functions (|Z|&equil;K) it is shown that at most CK(&egr;) bits must be encrypted (independent of x, y and f ). The results are extended to N persons communicating over a broadcast channel. The proofs rely on results concerning partitions of K valued matrices. For randomized Protocols it is shown that for all x,y Boolean f, and all possible joint distributions of X,Y (not only uniform), total secrecy (&egr;&equil;0) can be achieved using only two secret bits.