Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01rx913s12g
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorCuff, Paulen_US
dc.contributor.authorSchieler, Curten_US
dc.contributor.otherElectrical Engineering Departmenten_US
dc.date.accessioned2014-11-21T19:33:40Z-
dc.date.available2014-11-21T19:33:40Z-
dc.date.issued2014en_US
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01rx913s12g-
dc.description.abstractThe purpose of any communication system is to ensure reliable transmission of data from a sender to a receiver. An important secondary goal is to suitably encrypt the data so that an eavesdropper cannot glean any useful information from the communication. From an information-theoretic point of view, an ideal secure communication system ensures that an eavesdropper's observations are statistically independent of the information source. Unfortunately, a prohibitively large amount of shared secret key is necessary to guarantee such perfect secrecy. This prompts a natural question: if perfect secrecy is relaxed in order to ease the key requirement, then what is a good measure of "imperfect" secrecy? One of the successes of information theory has been to establish fundamental limits of lossy data compression through the use of rate-distortion theory. In rate-distortion theory, the receiver is allowed some loss in reproducing the source in order to reduce the compression ratio; the goal is to find the optimal tradeoff between the rate of compression and the receiver's distortion. This thesis explores the consequences of applying the rate-distortion paradigm to the problem of measuring imperfect secrecy in a communication system. In particular, the key question is: what is the optimal tradeoff between the rate of secret key and the distortion that an eavesdropper suffers in trying to reconstruct the source? It turns out that distortion-based measures of security are most appropriate in settings where the eavesdropper is assumed to have additional side information about the source. This thesis examines two such settings. In the first setting, the eavesdropper is able to view the past behavior of various parts of the communication system and update his actions accordingly. In the second setting, the eavesdropper receives rate-limited communication from an omniscient assistant. This thesis characterizes the optimal information-theoretic tradeoff between the key rate and the eavesdropper's distortion for general versions of both settings.en_US
dc.language.isoenen_US
dc.publisherPrinceton, NJ : Princeton Universityen_US
dc.relation.isformatofThe Mudd Manuscript Library retains one bound copy of each dissertation. Search for these copies in the <a href=http://catalog.princeton.edu> library's main catalog </a>en_US
dc.subjectinformation theoryen_US
dc.subjectlossy compressionen_US
dc.subjectrate-distortionen_US
dc.subjectsecrecyen_US
dc.subjectsource codingen_US
dc.subject.classificationElectrical engineeringen_US
dc.titleRate-Distortion Theory for Secrecy Systemsen_US
dc.typeAcademic dissertations (Ph.D.)en_US
pu.projectgrantnumber690-2143en_US
Appears in Collections:Electrical Engineering

Files in This Item:
File Description SizeFormat 
Schieler_princeton_0181D_11172.pdf1.27 MBAdobe PDFView/Download


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.