Rate-distortion Theory for Secrecy Systems

66
Rate-distortion Theory for Secrecy Systems Paul Cuff Electrical Engineering Princeton University

description

Rate-distortion Theory for Secrecy Systems. Paul Cuff Electrical Engineering Princeton University. Information Theory. Channel Coding. Source Coding. Secrecy. Secrecy. Channel. Source. Source Coding. Describe an information signal ( source ) with a message. Information. - PowerPoint PPT Presentation

Transcript of Rate-distortion Theory for Secrecy Systems

Page 1: Rate-distortion Theory for Secrecy Systems

Rate-distortion Theory for Secrecy SystemsPaul CuffElectrical EngineeringPrinceton University

Page 2: Rate-distortion Theory for Secrecy Systems
Page 3: Rate-distortion Theory for Secrecy Systems

Secrecy SourceChannel

Information Theory

Secrecy

Source Coding

Channel Coding

Page 4: Rate-distortion Theory for Secrecy Systems

Source Coding• Describe an information signal (source) with a

message.

Encoder DecoderMessageInformation Reconstruction

Page 5: Rate-distortion Theory for Secrecy Systems

Entropy

• If Xn is i.i.d. according to pX

• R > H(X) is necessary and sufficient for lossless reconstruction

Enumerate the typical setSpace of Xn sequences

Page 6: Rate-distortion Theory for Secrecy Systems

Many Methods

• For lossless source coding, the encoding method is not so important

• It should simply use the full entropy of the bits

Page 7: Rate-distortion Theory for Secrecy Systems

Single Letter Encoding (method 1)

• Encode each Xi separately• Under the constraints of decodability, Huffman codes are optimal• Expected length is within one bit of entropy• Encode tuples of symbols to get closer to the entropy limit

Page 8: Rate-distortion Theory for Secrecy Systems

Random Binning(method 2)

• Assign to each Xn sequence a random bit sequence (hash function)

0110100010010

Space of Xn sequences

1101011000100

0100110101011

Page 9: Rate-distortion Theory for Secrecy Systems

Linear Transformation(method 3)

Xn

JRandom Matrix

Source Message

Page 10: Rate-distortion Theory for Secrecy Systems

Summary• For lossless source coding, structure of communication

doesn’t matter much

Message Bits Received

InformationGathered

H(Xn)

Page 11: Rate-distortion Theory for Secrecy Systems

Lossy Source Coding

•What if the decoder must reconstruct with less than complete information?

• Error probability will be close to one

• Distortion as a performance metric

Page 12: Rate-distortion Theory for Secrecy Systems

Poor Performance

• Random Binning and Random Linear Transformations are useless!

Message Bits Received

Distortion

E d(X,y)

𝐻 (𝑋𝑛)

Time Sharing Massey Conjecture:Optimal for linear codes

Page 13: Rate-distortion Theory for Secrecy Systems

Puzzle

• Describe an n-bit random sequence

• Allow 1 bit of distortion

• Send only 1 bit

Page 14: Rate-distortion Theory for Secrecy Systems

Rate Distortion Theorem• [Shannon]

• Choose p(y|x):

Page 15: Rate-distortion Theory for Secrecy Systems

Structure of Useful Partial Information

• Coordination (Given source PX construct Yn ~ PY|X )

• Empirical

• Strong

Page 16: Rate-distortion Theory for Secrecy Systems

Empirical Coordination Codes• Codebook• Random subset of Yn sequences

• Encoder• Find the codeword that has the right joint first-order statistics

with the source

Page 17: Rate-distortion Theory for Secrecy Systems

Strong Coordination

• Black box acts like a memoryless channel• X and Y are an i.i.d. multisource

Source Output

PY|X

Communication Resources

Page 18: Rate-distortion Theory for Secrecy Systems

Strong Coordination

• Related to:• Reverse Shannon Theorem [Bennett et. al.]• Quantum Measurements [Winter]• Communication Complexity [Harsha et. al.]• Strong Coordination [C.-Permuter-Cover]• Generating Correlated R.V. [Anantharam, Gohari, et. al.]

Node A Node BMessage

Common Randomness

Source Output

Synthetic Channel PY|X

Page 19: Rate-distortion Theory for Secrecy Systems

Structure of Strong Coord.

K

Page 20: Rate-distortion Theory for Secrecy Systems

Information Theoretic Security

Page 21: Rate-distortion Theory for Secrecy Systems

Wiretap Channel[Wyner 75]

Page 22: Rate-distortion Theory for Secrecy Systems

Wiretap Channel[Wyner 75]

Page 23: Rate-distortion Theory for Secrecy Systems

Wiretap Channel[Wyner 75]

Page 24: Rate-distortion Theory for Secrecy Systems

Confidential Messages[Csiszar, Korner 78]

Page 25: Rate-distortion Theory for Secrecy Systems

Confidential Messages[Csiszar, Korner 78]

Page 26: Rate-distortion Theory for Secrecy Systems

Confidential Messages[Csiszar, Korner 78]

Page 27: Rate-distortion Theory for Secrecy Systems

Merhav 2008

Page 28: Rate-distortion Theory for Secrecy Systems

Villard-Piantanida 2010

Page 29: Rate-distortion Theory for Secrecy Systems

Other Examples of“rate-equivocation” theory

• Gunduz-Erkip-Poor 2008• Lia-H. El-Gamal 2008• Tandon-Ulukus-Ramchandran 2009• …

Page 30: Rate-distortion Theory for Secrecy Systems

Rate-distortion theory (secrecy)

Page 31: Rate-distortion Theory for Secrecy Systems

Achievable Rates and Payoff

Given

[Schieler, Cuff 2012 (ISIT)]

Page 32: Rate-distortion Theory for Secrecy Systems

How to Force High Distortion• Randomly assign bins• Size of each bin is • Adversary only knows bin

• Adversary has no knowledge of only knowledge of

Page 33: Rate-distortion Theory for Secrecy Systems

Causal Disclosure

Page 34: Rate-distortion Theory for Secrecy Systems

Causal Disclosure (case 1)

Page 35: Rate-distortion Theory for Secrecy Systems

Causal Disclosure (case 2)

Page 36: Rate-distortion Theory for Secrecy Systems

Example

• Source distribution is Bernoulli(1/2).

• Payoff: One point if Y=X but Z≠X.

Page 37: Rate-distortion Theory for Secrecy Systems

Rate-payoff Regions

Page 38: Rate-distortion Theory for Secrecy Systems

General Disclosure

Causal or non-causal

Page 39: Rate-distortion Theory for Secrecy Systems

Strong Coord. for Secrecy

Node A Node BInformation Action

AdversaryAttack

Channel Synthesis

Not optimal use of resources!

Page 40: Rate-distortion Theory for Secrecy Systems

Strong Coord. for Secrecy

Node A Node BInformation Action

AdversaryAttack

Channel Synthesis

Reveal auxiliary Un “in the clear”

Un

Page 41: Rate-distortion Theory for Secrecy Systems

Payoff-Rate Function• Maximum achievable average payoff

• Markov relationship:

Theorem:

Page 42: Rate-distortion Theory for Secrecy Systems

Structure of Secrecy Code

K

Page 43: Rate-distortion Theory for Secrecy Systems

INTERMISSIONEquivocation next

Page 44: Rate-distortion Theory for Secrecy Systems

Log-loss Distortion

Reconstruction space of Z is the set of distributions.

Page 45: Rate-distortion Theory for Secrecy Systems

Best Reconstruction Yields Entropy

Page 46: Rate-distortion Theory for Secrecy Systems

Log-loss (disclose X causally)

Page 47: Rate-distortion Theory for Secrecy Systems

Log-loss (disclose Y causally)

Page 48: Rate-distortion Theory for Secrecy Systems

Log-loss (disclose X and Y)

Page 49: Rate-distortion Theory for Secrecy Systems

Result 1 from Secrecy R-D Theory

Page 50: Rate-distortion Theory for Secrecy Systems

Result 2 from Secrecy R-D Theory

Page 51: Rate-distortion Theory for Secrecy Systems

Result 3 from Secrecy R-D Theory

Page 52: Rate-distortion Theory for Secrecy Systems

Some Difficulties• In point-to-point, optimal communication produces a

stationary performance.

• The following scenarios lend themselves to time varying performance.

Page 53: Rate-distortion Theory for Secrecy Systems

Secure Channel

• Adversary does not observe the message• Only access to causal disclosure

• Problem: Not able to isolate strong and empirical coordination.• Empirical coordination provides short-duration strong

coordination.• Hard to prove optimality.

Page 54: Rate-distortion Theory for Secrecy Systems

Side Information at the intended receiver

• Again, even a communication scheme built only on empirical coordination (covering) provides a short duration of strong coordination• Performance reduces in stages throughout the block.

Page 55: Rate-distortion Theory for Secrecy Systems

Cascade Network

Page 56: Rate-distortion Theory for Secrecy Systems

Inner and Outer Bounds

Page 57: Rate-distortion Theory for Secrecy Systems

Summary• To assist an intended receiver with partial information while

hindering an adversary with partial secrecy, a new encoding method is needed.

• Equivocation is characterized by this rate-distortion theory

• Main new encoding feature:• Strong Coordination superpositioned over revealed information

• (a.k.a. Reverse Shannon Theorem or Distributed Channel Synthesis)• In many cases (e.g. side information; secure communication

channel; cascade network), this distinct layering may not be possible.

Page 58: Rate-distortion Theory for Secrecy Systems

Restate Problem---Example 1 (RD Theory)

• Can we design:

such that

• Does there exists a distribution:

StandardExistence of Distributions

f g

Page 59: Rate-distortion Theory for Secrecy Systems

Restate Problem---Example 2 (Secrecy)

• Can we design:

such that

• Does there exists a distribution:

StandardExistence of Distributions

f g

Eve

Score

[Cuff 10]

Page 60: Rate-distortion Theory for Secrecy Systems

Tricks with Total Variation

• Technique• Find a distribution p1 that is easy to analyze and satisfies the relaxed

constraints.• Construct p2 to satisfy the hard constraints while maintaining small total

variation distance to p1.

How?

Property 1:

Page 61: Rate-distortion Theory for Secrecy Systems

Tricks with Total Variation

• Technique• Find a distribution p1 that is easy to analyze and satisfies the relaxed

constraints.• Construct p2 to satisfy the hard constraints while maintaining small total

variation distance to p1.

Why?

Property 2 (bounded functions):

Page 62: Rate-distortion Theory for Secrecy Systems

Summary• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions2. Relax Requirements to “close in total variation”3. Main Tool --- Reverse Channel Encoder4. Easy Analysis of Optimal Adversary

• Secrecy Example: For arbitrary ², does there exist a distribution satisfying:

Page 63: Rate-distortion Theory for Secrecy Systems

Cloud Overlap Lemma• Previous Encounters• Wyner, 75 --- used divergence• Han-Verdú, 93 --- general channels, used total variation• Cuff 08, 09, 10, 11 --- provide simple proof and utilize for secrecy encoding

PX|U(x|u)

Memoryless Channel

Page 64: Rate-distortion Theory for Secrecy Systems

Reverse Channel Encoder

• For simplicity, ignore the key K, and consider Ja to be the part of the message that the adversary obtains. (i.e. J = (Ja, Js), and ignore Js for now)

• Construct a joint distribution between the source Xn and the information Ja (revealed to the Adversary) using a memoryless channel.

PX|U(x|u)

Memoryless Channel

Page 65: Rate-distortion Theory for Secrecy Systems

Simple Analysis• This encoder yields a very simple analysis and convenient properties

1. If |Ja| is large enough, then Xn will be nearly i.i.d. in total variation2. Performance:

PX|U(x|u)

Memoryless Channel

Page 66: Rate-distortion Theory for Secrecy Systems

Summary

• Achievability Proof Techniques:1. Pose problems in terms of existence of joint distributions2. Relax Requirements to “close in total variation”3. Main Tool --- Reverse Channel Encoder4. Easy Analysis of Optimal Adversary

X n > B