Joint Source-Channel Secrecy Using Hybrid Coding Eva Song, Paul - - PowerPoint PPT Presentation

joint source channel secrecy using hybrid coding
SMART_READER_LITE
LIVE PREVIEW

Joint Source-Channel Secrecy Using Hybrid Coding Eva Song, Paul - - PowerPoint PPT Presentation

Joint Source-Channel Secrecy Using Hybrid Coding Eva Song, Paul Cuff, and H. Vincent Poor Department of Electrical Engineering Princeton University June 19, 2015 A source-channel coding setting t = 1 , . . . , n S t Decoder g n Y n S n X n


slide-1
SLIDE 1

Joint Source-Channel Secrecy Using Hybrid Coding

Eva Song, Paul Cuff, and H. Vincent Poor

Department of Electrical Engineering Princeton University

June 19, 2015

slide-2
SLIDE 2

A source-channel coding setting

Encoder fn PYZ|X Decoder gn Eve t = 1, . . . , n Sn X n Y n Z n ˆ St ˇ St St−1

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 2 / 22

slide-3
SLIDE 3

A source-channel coding setting

Encoder fn PYZ|X Decoder gn Eve t = 1, . . . , n Sn X n Y n Z n ˆ St ˇ St St−1 Quality of reconstruction: d(Sn, ˆ Sn), d(Sn, ˇ Sn)

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 2 / 22

slide-4
SLIDE 4

A source-channel coding setting

Encoder fn PYZ|X Decoder gn Eve t = 1, . . . , n Sn X n Y n Z n ˆ St ˇ St St−1 Quality of reconstruction: d(Sn, ˆ Sn), d(Sn, ˇ Sn) Why causal disclosure?

◮ Stronger formulation: to the favor of eavesdropper ◮ Can generalize equivocation Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 2 / 22

slide-5
SLIDE 5

In this talk...

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 3 / 22

slide-6
SLIDE 6

In this talk...

Design source-channel coding schemes for (Db, De) s.t.

◮ E

  • d(Sn, ˆ

Sn)

  • ≤n Db

◮ min{Pˇ

St |ZnSt−1}n t=1 E[d(Sn, ˇ

Sn)] ≥n De

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 3 / 22

slide-7
SLIDE 7

In this talk...

Design source-channel coding schemes for (Db, De) s.t.

◮ E

  • d(Sn, ˆ

Sn)

  • ≤n Db

◮ min{Pˇ

St |ZnSt−1}n t=1 E[d(Sn, ˇ

Sn)] ≥n De

Analysis uses The Likelihood Encoder

◮ Total variation distance ◮ Soft-covering lemma Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 3 / 22

slide-8
SLIDE 8

What is a likelihood encoder?

a stochastic source encoder: fn : X n → M Encoder fn Decoder gn X n M Y n

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 4 / 22

slide-9
SLIDE 9

What is a likelihood encoder?

a stochastic source encoder: fn : X n → M Encoder fn Decoder gn X n M Y n Given a codebook {yn(m)}m, m ∈ [1 : 2nR] a joint distribution PXY the likelihood function for each codeword: L(m|xn) PX n|Y n(xn|yn(m)) =

  • PX|Y (xn|yn(m))

the likelihood encoder determines the message index according to: PM|X n(m|xn) = L(m|xn)

  • m′∈[1:2nR] L(m′|xn) ∝ L(m|xn).

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 4 / 22

slide-10
SLIDE 10

Warm up – soft-covering lemma

Lemma

Given 1) PUXZ 2) random C(n) of sequences Un(m) ∼ n

t=1 PU(ut), m ∈ [1 : 2nR]

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 5 / 22

slide-11
SLIDE 11

Warm up – soft-covering lemma

Lemma

Given 1) PUXZ 2) random C(n) of sequences Un(m) ∼ n

t=1 PU(ut), m ∈ [1 : 2nR]

Let PMX nZ k(m, xn, zk) 1 2nR

n

  • t=1

PX|U(xt|Ut(m))

k

  • t=1

PZ|XU(zt|xt, Ut(m)) PX nZ k

n

  • t=1

PX(xt)

k

  • t=1

PZ|X(zt|xt)

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 5 / 22

slide-12
SLIDE 12

Warm up – soft-covering lemma

Lemma

Given 1) PUXZ 2) random C(n) of sequences Un(m) ∼ n

t=1 PU(ut), m ∈ [1 : 2nR]

Let PMX nZ k(m, xn, zk) 1 2nR

n

  • t=1

PX|U(xt|Ut(m))

k

  • t=1

PZ|XU(zt|xt, Ut(m)) PX nZ k

n

  • t=1

PX(xt)

k

  • t=1

PZ|X(zt|xt) If R > I(X; U), then ECn PX nZ k − PX nZ k

  • TV
  • ≤ exp(−γn) →n 0,

for any β < R−I(X;U)

I(Z;U|X) , k ≤ βn, γ > 0 depending on this gap.

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 5 / 22

slide-13
SLIDE 13

Problem setup

Encoder fn PYZ|X Decoder gn Eve t = 1, . . . , n Sn X n Y n Z n ˆ St ˇ St St−1

i.i.d. source Sn ∼ n

t=1 PS(st)

memoryless broadcast channel n

t=1 PYZ|X(yt, zt|xt)

Encoder fn : Sn → X n (possibly stochastic) Legitimate receiver decoder gn : Yn → ˆ Sn (possibly stochastic) Eavesdropper decoders {Pˇ

St|Z nSt−1}n t=1

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 6 / 22

slide-14
SLIDE 14

Definition

Definition

A distortion pair (Db, De) is achievable if there exists a sequence of source-channel encoders and decoders (fn, gn) such that E[d(Sn, ˆ Sn)] ≤n Db and min

{Pˇ

St |ZnSt−1}n t=1

E[d(Sn, ˇ Sn)] ≥n De.

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 7 / 22

slide-15
SLIDE 15

We consider

Scheme O – Operationally separate SC coding [Schieler et al. Allerton 2012] Scheme I – Joint SC coding using Hybrid Coding Scheme II – Joint SC coding using superposition Hybrid Coding

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 8 / 22

slide-16
SLIDE 16

Scheme O – operational separate

Theorem

A distortion pair (Db, De) is achievable if I(S; U1) < I(U2; Y ) I(S; ˆ S|U1) < I(V2; Y |U2) − I(V2; Z|U2) Db ≥ E

  • d(S, ˆ

S)

  • De ≤ η min

a∈ ˆ S

E[d(S, a)] + (1 − η) min

t(u1) E[d(S, t(U1))]

for some distribution PSP ˆ

S|SPU1|ˆ SPU2PV2|U2PX|V2PYZ|X, where

η = [I(U2; Y ) − I(U2; Z)]+ I(S; U1) .

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 9 / 22

slide-17
SLIDE 17

Hybrid coding

Likelihood Encoder PX|SU PYZ|X Channel Decoder φ(u, y) Sn Un(M) X n Y n Un( ˆ M) ˆ Sn

at least optimal for P2P communication [Minero et al.] achieves best known bounds in multiuser settings Secrecy: need stochastic symbol-by-symbol mapping

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 10 / 22

slide-18
SLIDE 18

Scheme I – basic hybrid coding

Theorem

A distortion pair (Db, De) is achievable if I(U; S) < I(U; Y ) Db ≥ E[d(S, φ(U, Y ))] De ≤ β min

ψ0(z) E[d(S, ψ0(Z))]

+(1 − β) min

ψ1(u,z) E[d(S, ψ1(U, Z))]

where β = min [I(U; Y ) − I(U; Z)]+ I(S; U|Z) , 1

  • for some distribution PSPU|SPX|SUPYZ|X and function φ(·, ·).

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 11 / 22

slide-19
SLIDE 19

Scheme I – achievability scheme

Fix distribution PSPU|SPX|SUPYZ|X Codebook generation: Independently generate 2nR sequences in Un according to n

t=1 PU(ut) and index by m ∈ [1 : 2nR]

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 12 / 22

slide-20
SLIDE 20

Scheme I – achievability scheme – continued

Encoder

◮ likelihood encoder PLE(m|sn) with

L(m|sn) = PSn|Un(sn|un(m))

◮ produces channel input through a random transformation:

n

t=1 PX|SU(xt|st, Ut(m))

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 13 / 22

slide-21
SLIDE 21

Scheme I – achievability scheme – continued

Encoder

◮ likelihood encoder PLE(m|sn) with

L(m|sn) = PSn|Un(sn|un(m))

◮ produces channel input through a random transformation:

n

t=1 PX|SU(xt|st, Ut(m))

Decoder

◮ good channel decoder PD1( ˆ

m|y n) w.r.t. codebook {un(a)}a and memoryless channel PY |U

◮ deterministic mapping φn(un, y n) is the concatenation of

{φ(ut, yt)}n

t=1:

PD2(ˆ sn| ˆ m, y n) ✶{ˆ sn = φn(un( ˆ m), y n)}

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 13 / 22

slide-22
SLIDE 22

Analysis outline – at legitimate receiver

System induced distribution P Idealized distribution Q QMUnSnX nY nZ n(m, un, sn, xn, yn, zn)

  • 1

2nR ✶{un = Un(m)}

n

  • t=1

PS|U(st|ut)

n

  • t=1

PX|SU(xt|st, ut)

n

  • t=1

PYZ|X(yt, zt|xt). soft-covering: R > I(U; S) ⇒ P ≈ Q channel coding: R ≤ I(U; Y ) ⇒ EC(n)

  • EP
  • d(Sn, ˆ

Sn)

  • ≤ EP[d(S, φ(U, Y ))] + δn

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 14 / 22

slide-23
SLIDE 23

Analysis outline – at eavesdropper

auxiliary distribution ˇ Q(i)

SiZ n(si, zn) n

  • t=1

PZ(zt)

i

  • j=1

PS|Z(sj|zj) soft-covering: R > I(Z; U) ⇒ ˇ Q(i)

Z nSi ≈ QZ nSi

i can go up to βn, for any β < R−I(U;Z)

I(S;U|Z)

phase transition in distortion

◮ before βn: ◮ min{ψ0i(si−1,zn)}i EP

  • 1

k

k

i=1 d(Si, ψ0i(Si−1, Z n))

minψ0(z) EP [d(S, ψ0(Z))] − ǫn

◮ after βn: ◮ min{ψ1i(si−1,zn)} EP

  • 1

k

n

i=j d(Si, ψ1i(Si−1, Z n))

minψ1(u,z) EP [d(S, ψ1(U, Z))] − ǫn

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 15 / 22

slide-24
SLIDE 24

Scheme II – superposition hybrid coding

Theorem

A distortion pair (Db, De) is achievable if I(V ; S) < I(UV ; Y ) Db ≥ E [d(S, φ(V , Y ))] De ≤ min{β, α} min

ψ0(z) E [d(S, ψ0(Z))]

+ (α − min{β, α}) min

ψ1(u,z) E [d(S, ψ1(U, Z))]

+(1 − α) min

ψ2(v,z) E [d(S, ψ2(V , Z))]

for some distribution PSPV |SPU|V PX|SUV PYZ|X and function φ(·, ·).

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 16 / 22

slide-25
SLIDE 25

Scheme II – achievability proof

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 17 / 22

slide-26
SLIDE 26

Scheme II – achievability proof

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 17 / 22

slide-27
SLIDE 27

Relations among schemes

Scheme II generalizes Scheme I Scheme II generalizes Scheme O

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 18 / 22

slide-28
SLIDE 28

Perfect secrecy outer bound

Theorem

If (Db, De) is achievable, then I(S; U) ≤ I(U; Y ) Db ≥ E[d(S, φ(U, Y ))] De ≤ min

a∈ ˆ S

E[d(S, a)] for some distribution PSPU|SPX|SUPYZ|X and function φ(·, ·).

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 19 / 22

slide-29
SLIDE 29

Numerical example

Source: i.i.d. Bern(p) Channels: BSC with crossover probabilities p1, p2 Legitimate receiver: lossless decoding Eavesdropper: Hamming distortion

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 20 / 22

slide-30
SLIDE 30

Numerical example

0.0 0.1 0.2 0.3 0.4 0.5

p

0.0 0.1 0.2 0.3 0.4 0.5

De

Scheme O Scheme I No Encoding Perfect Secrecy Outer Bound

Figure: Distortion at the eavesdropper as a function of source distribution p with p1 = 0, p2 = 0.3

Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 21 / 22

slide-31
SLIDE 31

Summary

have done:

◮ achieved better performance in joint source-channel secrecy with hybrid

coding

◮ superposition hybrid coding (II) fully generalizes basic hybrid coding (I)

and operationally separate SC coding (O)

have not done:

◮ Can I outperform O? ◮ Is II strictly better than I? ◮ non-trivial outer bound? Song, Cuff, Poor (Princeton University) Joint Source-Channel Secrecy June 19, 2015 22 / 22