Secure Information Exchange for Omniscience
Chung Chan, Navin Kashyap, Praneeth Kumar Vippathalla and Qiaoqiao Zhou
Secure Information Exchange
Public
info.
Private
info.
Network
Nodes
Target
info.
Censored
info.
Interactive Public discussion
Secure Information Exchange
- Private information extraction problem [Asoodeh et al 19]
- \( V =\{1,2\}\)
- \( Z_1 = (X_2, Y_2)\) and \(X_1\), \(Y_1\), \(Z_2\) are null
- Information bottleneck [Tishby et al 99]
- \(X_1\), \(Y_1\), \(X_2\) and \(Z_2\) are null
- Secure function computation [Tyagi et al 11]
Secure Omniscience Scenario
Interactive Public discussion
- Special case of secure information exchange
Problem Formulation
- Smallest achievable total discussion rate for omniscience \(r(V):=\sum_{i\in V} r_i\) is denoted by
$$ R_{CO} :=\inf \{ r(V) |(r_V,u_V,\ell_V)\in \mathcal{R}, u_i=H(Z_V|Z_i) \forall i\in A\} $$
- Minimum leakage
$$ R_{L} := \inf\{\ell_{w} | (u_V,\ell_V,r_V)\in \mathcal{R}, u_i=H(Z_V|Z_i)\,\forall i\in A\}$$
- When \(Z_w = \empty \), \(R_{CO} = R_L\)
- Wiretapper is not vocal and has no target info.
- Helpers have no target and censored info.
\(R_L\) and \(R_{CO}\) are not simultaneously achievable!
$$A:=\{1,2\} \subseteq U:=\{1,2,3\} \\ Z_w := (X_a+ X_b, X_b+ X_c)\\Z_1 := (X_a,X_b) \\Z_2 := (X_b, X_c)\\ Z_3 := (X_a+ X_b+ X_c)$$
$$R_{CO} = \min \{r(U): r_1+r_2 \geq 0, r_1+r_3 \geq 1, r_2+r_3 \geq 1\} =1$$
\((r_1,r_2,r_3)=(0,0,1)\) uniquely achieves it
\(X_a,X_b, \) and \( X_c\) are uniformly random and independent bits
\(F =(F_1,F_2)=(X_a^n+X_b^n,X_b^n+X_c^n)\)
\(F=F_3=Z_3^n\)
\(l_w = 1\) bit
\(l_w = 0\)
\(R_L = 0\)
Any scheme with \((r_1,r_2,r_3)=(0,0,1)\) cannot have \(R_L = 0\)
achieves omniscience
Main Results
Theorem 1 (Lower bound on minimum leakage)
For the secure omniscience scenario with \(|A| \geq 2\)
\(W\) is any random variable satisfying \( I(W\wedge Z_U | Z_w)=0\)
$$R_L \geq H(Z_U|Z_w) - C_S \geq R_{CO}(Z_U|W) - I(Z_U \wedge Z_w | W)$$
wiretapper secret key capacity
smallest communication rate for omniscience of the source \(Z_U\) for the active users who also have \(W\)
This theorem relates \(R_L\) and \(C_S/ R_{CO}\)
Proof Idea
use a discussion scheme that achieves \(R_{L}\) and privacy amplification technique [csiszar et al.'04] to extract a secret key at rate \(H(Z_U|Z_w)-R_{L}\leq C_S\) from the recovered source.
- For the first lower bound,
$$R_{L}\geq H(Z_U|Z_w)-C_S$$
follows from the upper bound [csiszar et al. '04] on \(C_S\), $$C_S\leq H(Z_U|W) - R_{CO}(Z_U|W)$$
- The second lower bound,
$$ H(Z_U|Z_w) - C_S \geq R_{CO}(Z_U|W) - I(Z_U \wedge Z_w | W)$$
Lower Bound is Not Tight
$$A:=\{1,2\} \subseteq U:=\{1,2,3\} \\ Z_w := X_a+ X_b,\\ Z_1 = Z_2 := X_a , Z_3 := X_b$$
\(X_a,X_b, \) and \( X_c\) are uniformly random and independent bits
Secret key $$K = X_a^n \perp Z_w^n$$
Achieved with no discussion
\(1\leq C_S\)
\(\leq H(Z_1) =1\)
\(R_L \geq H(Z_U|Z_w) - C_S = 1-1=0\)
Lower bound
\(F =F_3=X_b^n\)
\(l_w =1\)
\(R_L \leq 1\)
It is shown that \(R_L = 1\)
achieves omniscience
Main Results
Theorem 2 (Upper bound on minimum leakage)
For the secure omniscience scenario,
any public discussion on block length \(m\)
positive integer
Set \(m=1\) and \(F'\) to a constant
Proof Idea
Leakage rate is
Additionally, \(F''\) is revealed to attain omniscience with rate
$$\frac{1}{n} H(F'')= \frac{1}{m} R_{CO}(Z_U^m|F')$$
$$\frac{1}{n} I({F'}^{\frac{n}{m}}, F'' \wedge Z_U^n | Z_{w}^n) \leq \frac{1}{n} H(F'') + \frac{1}{n} I({F'}^{\frac{n}{m}} \wedge Z_U^n | Z_{w}^n)$$
$$ \to \frac{1}{m} [ R_{CO}(Z_U^m|F') + I(Z_U^m \wedge F' | Z_w^m) ]$$
\(Z_{U1}\)
\(Z_{Um}\)
\(Z_{Un}\)
\(Z_{U(n-m+1)}\)
\(Z_{U2}\)
\(Z_{U}^n\)
\(F'_1\)
\(F'_{\frac{n}{m}}\)
\(F'_1\)
Tightness of Upper bound
\(R_{CO}\) upper bound is improved by an additional information alignment step that completely aligns \(F'\) to the \(Z_{w}\)
\(R_L\) and \(R_{CO}\) are not simultaneously achievable
\(F'=(F'_1,F'_2)=(X_a+X_b,X_b+X_c)=Z_{w}\) with \(m=1\)
\(R_L \leq R_{CO}(Z_U|Z_{w}) + I(Z_U \wedge F'|Z_{w}) = 0\)
$$A:=\{1,2\} \subseteq U:=\{1,2,3\} \\ Z_w := (X_a+ X_b, X_b+ X_c)\\Z_1 := (X_a,X_b) \\Z_2 := (X_b, X_c)\\ Z_3 := (X_a+ X_b+ X_c)$$
\(X_a,X_b, \) and \( X_c\) are uniformly random and independent bits
\(R_{CO} = 1\)
\(R_L = 0\)
\(< R_{CO} = 1\)
achieves omniscience
Example with Tight Upper and Lower bound
$$A=U:=\{1,2,3,4\} \\ Z_w := X_a+ X_b+ X_c\\Z_1 := X_a\\ Z_2 := (X_a, X_b)\\ Z_3 := (X_b, X_c)\\Z_4 := X_c$$
\(X_a,X_b, \) and \( X_c\) are uniformly random and independent bits
$$R_{L} \geq H(Z_U|Z_{w}) - C_S \geq 2-1 = 1$$
\(C_s\leq H(Z_1) =1\)
$$R_{L} \leq \frac{1}{m} I(Z_U^m\wedge F'|Z_{w}^m) $$
$$= \frac{1}{2} H(F'|Z_{w}^2) = 1$$
$$F'_2 = \begin{bmatrix} X_{a1}\\ X_{a2}\end{bmatrix} + \begin{bmatrix} 1 & 1\\ 1 & 0\end{bmatrix} \begin{bmatrix} X_{b1}\\ X_{b2}\end{bmatrix}$$
$$F'_3 = \begin{bmatrix} X_{c1}\\ X_{c2}\end{bmatrix} + \begin{bmatrix} 0 & 1\\ 1 & 1\end{bmatrix} \begin{bmatrix} X_{b1}\\ X_{b2}\end{bmatrix}$$
\(F'=(F'_2,F'_3)\)
achieves omniscience
\(R_{CO}(Z_U^2|F') = 0\)
Main Results
Theorem 3 (Two-user finite linear source)
where \(G\) can be chosen to be \(G_1\) \(G_2\), or both \(G_1,G_2\), with \(G_i\) being the solution to
For secure omniscience with \(A=U=\{1,2\}\) and finite linear source \(Z_V\)
Proof Idea
There exist functions \(Z_i'\) of \(Z_i\) such that \(I(Z_i'\wedge G_1) = H(Z_i|Z_i',G_1) = 0\)
$$R_{L} \geq R_{CO}(Z_U|G_1) - I(Z_U\wedge Z_{w}|G_1)$$
Since \(G_1\) is a function of \(Z_w\)
$$\geq H(Z_U|Z_{w}) - I(Z_1\wedge Z_2|G_1)$$
$$R_{L} \leq R_{CO}(Z_U|F') + I(Z_U\wedge F'|Z_{w})$$
$$= H(Z_U|Z_{w})+ I(Z_U\wedge Z_{w}|F') -I(Z_1\wedge Z_2|F')$$
$$F'=(F'_1,F'_2) $$
$$R_{L} \leq H(Z_U|Z_{w}) - I(Z_1\wedge Z_2|G_1)$$
$$ F'_1 := (X_a A, G_1), F'_2 := X_b B + X_c C$$
Extension/Challenges
- The upper bound on the minimum leakage can be shown to be tight for the two-user case with one-way discussion
- Sufficient conditions for the minimum leakage upper bound to match the lower bound can also be derived and shown to hold for multiterminal hypergraphical sources
References
[1] C. H. Bennett, G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM journal on Computing, vol. 17, no. 2, pp.210–229, 1988.
[2] R. Ahlswede and I. Csiszár, “Common randomness in information theory and cryptography—Part I: Secret sharing,” IEEE Transactions on Information Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993.
[3] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 733–742, 1993.
[4] I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047–3061, Dec. 2004.
[5] A. Gohari and V. Anantharam, “Information-theoretic key agreement of multiple terminals—Part I,” IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 3973 –3996, Aug. 2010.
[6] A. Kaspi, “Two-way source coding with a fidelity criterion,” IEEE Transactions on Information Theory, vol. 31, no. 6, pp. 735–740,
November 1985.
[7] S. Asoodeh, M. Diaz, F. Alajaji, and T. Linder, “Estimation efficiency under privacy constraints,” IEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1512–1534, March 2019.
[8] N. Tishby, F. C. Pereira, and W. Bialek, “The information bottleneck method,” in Thirty-Seventh Annual Allerton Conference on Communication, Control, and Computing, Sep. 1999.
[9] N. Slonim, “The information bottleneck: Theory and applications,” Ph.D. dissertation, Citeseer, 2002.
[10] N. Tishby and N. Zaslavsky, “Deep learning and the information bottleneck principle,” in IEEE Information Theory Workshop (ITW), April 2015, pp. 1–5.
[11] R. A. Amjad and B. C. Geiger, “Learning representations for neural network-based classification using the information bottleneck principle,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2019.
[12] I. Csiszár and J. Körner, Information Theory: Coding Theorems for Discrete Memoryless Systems. Akadémiai Kiadó, Budapest, 1981.
References
[13] C. Chan, N. Kashyap, P. K. Vippathalla, and Q. Zhou, “Secure information exchange for omniscience,” 2019. [Online]. Available:
http://bit.ly/secureomniscience
[14] C. Chan and L. Zheng, “Mutual dependence for secret key agreement,” in Proceedings of 44th Annual Conference on Information Sciences and Systems, 2010.
[15] P. Gács and J. Körner, “Common information is far less than mutual information,” Problems of Control and Information Theory, vol. 2, no. 2, pp. 149–162, Feb. 1972.
[16] C. Chan, M. Mukherjee, N. Kashyap, and Q. Zhou, “Multiterminal secret key agreement at asymptotically zero discussion rate,” in 2018 IEEE International Symposium on Information Theory (ISIT). IEEE, 6 2018, pp. 2654–2658.
[17] H. Tyagi, P. Narayan, and P. Gupta, “When is a function securely computable?” IEEE Transactions on Information Theory, vol. 57, no. 10, pp. 6337–6350, 2011.
[18] M. M. Mojahedian, M. R. Aref, and A. Gohari, “Perfectly secure index coding,” IEEE Transactions on Information Theory, vol. 63, no. 11, pp. 7382–7395, Nov 2017.
[19] L. Ong, J. Kliewer, and B. N. Vellambi, “Secure network-index code equivalence: Extension to non-zero error and leakage,” in 2018 IEEE International Symposium on Information Theory (ISIT), 2018, pp. 841–845.
[20] A. Orlitsky and J. R. Roche, “Coding for computing,” IEEE Transactions
on Information Theory, vol. 47, no. 3, pp. 903–917, March 2001.
deck
By Praneeth Kumar
deck
- 155