Privacy through familiarity

Wasim Huleihel, Muriel Medard

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

This paper considers the problem of transmitting digital data from a source reliably to a legitimate user, subjected to a wiretap at a receiver that employs a fixed decoding strategy. Specifically, we assume that the wiretapper views the same channel output as the legitimate user, but decodes the message using some fixed decoding strategy which might be mismatched with respect to the channel. This model aims to capture the natural situation in privacy where knowledge of the privacy mapping at the source can me modeled as channel statistics. In that case, all observers receive the same data, but have different levels of knowledge, or familiarity, regarding the observed user who uses a privacy mapping. We analyze two different security metrics; probability of error at the eavesdropper and semantic-security, and provide achievable rates under both criteria.

Original languageEnglish
Title of host publication2017 IEEE Information Theory Workshop, ITW 2017
PublisherInstitute of Electrical and Electronics Engineers
Pages314-318
Number of pages5
ISBN (Electronic)9781509030972
DOIs
StatePublished - 2 Jul 2017
Externally publishedYes
Event2017 IEEE Information Theory Workshop, ITW 2017 - Kaohsiung, Taiwan, Province of China
Duration: 6 Nov 201710 Nov 2017

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2018-January
ISSN (Print)2157-8095

Conference

Conference2017 IEEE Information Theory Workshop, ITW 2017
Country/TerritoryTaiwan, Province of China
CityKaohsiung
Period6/11/1710/11/17

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Information Systems
  • Modeling and Simulation
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Privacy through familiarity'. Together they form a unique fingerprint.

Cite this