#### Filter Results:

#### Publication Year

2013

2015

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

—We study secure source-coding with causal disclosure , under the Gaussian distribution. The optimality of Gaus-sian auxiliary random variables is shown in various scenarios. We explicitly characterize the tradeoff between the rates of communication and secret key. This tradeoff is the result of a mutual information optimization under Markov constraints. As… (More)

—We investigate channel synthesis in a cascade setting where nature provides an iid sequence X n at node 1. Node 1 can send a message at rate R1 to node 2 and node 2 can send a message at rate R2 to node 3. Additionally, all 3 nodes share bits of common randomness at rate R0. We want to generate sequences Y n and Z n along nodes in the cascade such that (X… (More)

—We investigate the problem of secure source coding with a two-sided helper in a game-theoretic framework. Alice (A) and Helen (H) view iid correlated information sequences X n and Y n respectively. Alice communicates to Bob (B) at rate R, while H broadcasts a message to both A and B at rate RH. Additionally, A and B share secret key K at rate R0 that is… (More)

- ‹
- 1
- ›