Skip to main content

Showing 1–50 of 58 results for author: Cuff, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:1801.00714  [pdf, ps, other

    cs.IT

    Exact Exponent for Soft Covering

    Authors: Semih Yagli, Paul Cuff

    Abstract: This work establishes the exact exponents for the soft-covering phenomenon of a memoryless channel under the total variation metric when random (i.i.d. and constant-composition) channel codes are used. The exponents, established herein, are strict improvements in both directions on bounds found in the literature. This complements the recent literature establishing the exact exponents under the rel… ▽ More

    Submitted 24 June, 2019; v1 submitted 2 January, 2018; originally announced January 2018.

    Comments: Same as the published version except that hyper-links enabled. Please cite the TransIT version

  2. arXiv:1708.04283  [pdf, ps, other

    cs.IT

    Key and Message Semantic-Security over State-Dependent Channels

    Authors: Alexander Bunin, Ziv Goldfeld, Haim H. Permuter, Shlomo Shamai, Paul Cuff, Pablo Piantanida

    Abstract: We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes other instances of CSI availability as special cases, and calls for efficient utilization of the state sequence for both reliability and security purposes. An inn… ▽ More

    Submitted 7 June, 2019; v1 submitted 14 August, 2017; originally announced August 2017.

  3. arXiv:1702.06260  [pdf, ps, other

    cs.IT

    Information-Theoretic Perspectives on Brascamp-Lieb Inequality and Its Reverse

    Authors: **gbo Liu, Thomas A. Courtade, Paul Cuff, Sergio Verdu

    Abstract: We introduce an inequality which may be viewed as a generalization of both the Brascamp-Lieb inequality and its reverse (Barthe's inequality), and prove its information-theoretic (i.e.\ entropic) formulation. This result leads to a unified approach to functional inequalities such as the variational formula of Rényi entropy, hypercontractivity and its reverse, strong data processing inequalities, a… ▽ More

    Submitted 3 December, 2017; v1 submitted 20 February, 2017; originally announced February 2017.

    Comments: Corrected some typos in the previous version

  4. Differential Privacy as a Mutual Information Constraint

    Authors: Paul Cuff, Lanqing Yu

    Abstract: Differential privacy is a precise mathematical constraint meant to ensure privacy of individual pieces of information in a database even while queries are being answered about the aggregate. Intuitively, one must come to terms with what differential privacy does and does not guarantee. For example, the definition prevents a strong adversary who knows all but one entry in the database from further… ▽ More

    Submitted 12 August, 2016; originally announced August 2016.

    Comments: ACM CCS 2016, 12 pages

    ACM Class: H.1.1; H.2.0

  5. arXiv:1608.00743  [pdf, ps, other

    cs.IT

    Wiretap Channels with Random States Non-Causally Available at the Encoder

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence for both reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result publis… ▽ More

    Submitted 28 May, 2019; v1 submitted 2 August, 2016; originally announced August 2016.

  6. arXiv:1605.06396  [pdf, ps, other

    cs.IT

    Soft Covering with High Probability

    Authors: Paul Cuff

    Abstract: Wyner's soft-covering lemma is the central analysis step for achievability proofs of information theoretic security, resolvability, and channel synthesis. It can also be used for simple achievability proofs in lossy source coding. This work sharpens the claim of soft-covering by moving away from an expected value analysis. Instead, a random codebook is shown to achieve the soft-covering phenomenon… ▽ More

    Submitted 20 May, 2016; originally announced May 2016.

    Comments: ISIT 2016, 5 pages, 6 figures, uses IEEEtran. arXiv admin note: text overlap with arXiv:1508.01602

    MSC Class: 94A15 ACM Class: H.1.1

  7. arXiv:1605.02818  [pdf, ps, other

    cs.IT

    Brascamp-Lieb Inequality and Its Reverse: An Information Theoretic View

    Authors: **gbo Liu, Thomas A. Courtade, Paul Cuff, Sergio Verdu

    Abstract: We generalize a result by Carlen and Cordero-Erausquin on the equivalence between the Brascamp-Lieb inequality and the subadditivity of relative entropy by allowing for random transformations (a broadcast channel). This leads to a unified perspective on several functional inequalities that have been gaining popularity in the context of proving impossibility results. We demonstrate that the informa… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 5 pages; to be presented at ISIT 2016

  8. arXiv:1602.02216  [pdf, ps, other

    cs.IT

    Smoothing Brascamp-Lieb Inequalities and Strong Converses for Common Randomness Generation

    Authors: **gbo Liu, Thomas A. Courtade, Paul Cuff, Sergio Verdu

    Abstract: We study the infimum of the best constant in a functional inequality, the Brascamp-Lieb-like inequality, over auxiliary measures within a neighborhood of a product distribution. In the finite alphabet and the Gaussian cases, such an infimum converges to the best constant in a mutual information inequality. Implications for strong converse properties of two common randomness (CR) generation problem… ▽ More

    Submitted 6 February, 2016; originally announced February 2016.

    Comments: 7 pages; first 5 pages submitted to ISIT 2016

  9. arXiv:1601.03660  [pdf, ps, other

    cs.IT

    Arbitrarily Varying Wiretap Channels with Type Constrained States

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: An arbitrarily varying wiretap channel (AVWTC) with a type constraint on the allowed state sequences is considered, and a single-letter characterization of its correlated-random (CR) assisted semantic-security (SS) capacity is derived. The allowed state sequences are the ones in a typical set around a single constraining type. SS is established by showing that the mutual information between the me… ▽ More

    Submitted 18 October, 2016; v1 submitted 14 January, 2016; originally announced January 2016.

  10. arXiv:1601.03378  [pdf, other

    cs.CR

    Differentially Private Oblivious RAM

    Authors: Sameer Wagh, Paul Cuff, Prateek Mittal

    Abstract: In this work, we investigate if statistical privacy can enhance the performance of ORAM mechanisms while providing rigorous privacy guarantees. We propose a formal and rigorous framework for develo** ORAM protocols with statistical security viz., a differentially private ORAM (DP-ORAM). We present Root ORAM, a family of DP-ORAMs that provide a tunable, multi-dimensional trade-off between the des… ▽ More

    Submitted 15 July, 2018; v1 submitted 13 January, 2016; originally announced January 2016.

  11. arXiv:1601.01286  [pdf, ps, other

    cs.IT

    Strong Secrecy for Cooperative Broadcast Channels

    Authors: Ziv Goldfeld, Gerhard Kramer, Haim H. Permuter, Paul Cuff

    Abstract: A broadcast channel (BC) where the decoders cooperate via a one-sided link is considered. One common and two private messages are transmitted and the private message to the cooperative user should be kept secret from the cooperation-aided user. The secrecy level is measured in terms of strong secrecy, i.e., a vanishing information leakage. An inner bound on the capacity region is derived by using… ▽ More

    Submitted 28 May, 2019; v1 submitted 6 January, 2016; originally announced January 2016.

  12. arXiv:1601.00899  [pdf, other

    cs.IT

    Secret Key Generation with Limited Interaction

    Authors: **gbo Liu, Paul Cuff, Sergio Verdú

    Abstract: A basic two-terminal secret key generation model is considered, where the interactive communication rate between the terminals may be limited, and in particular may not be enough to achieve the maximum key rate. We first prove a multi-letter characterization of the key-communication rate region (where the number of auxiliary random variables depend on the number of rounds of the communication), an… ▽ More

    Submitted 27 March, 2017; v1 submitted 5 January, 2016; originally announced January 2016.

    Comments: 50 pages; short version appeared in ISIT 2016. Removed an incorrect result in the previous arXiv version (see acknowledgement)

  13. arXiv:1511.07829  [pdf, other

    cs.IT

    $E_γ$-Resolvability

    Authors: **gbo Liu, Paul Cuff, Sergio Verdú

    Abstract: The conventional channel resolvability refers to the minimum rate needed for an input process to approximate the channel output distribution in total variation distance. In this paper we study $E_γ$-resolvability, in which total variation is replaced by the more general $E_γ$ distance. A general one-shot achievability bound for the precision of such an approximation is developed. Let… ▽ More

    Submitted 20 July, 2017; v1 submitted 24 November, 2015; originally announced November 2015.

    Comments: 30 pages, 5 figures, presented in part at 2015 IEEE International Symposium on Information Theory (ISIT)

  14. arXiv:1509.03619  [pdf, ps, other

    cs.IT

    Semantic-Security Capacity for Wiretap Channels of Type II

    Authors: Ziv Goldfeld, Paul Cuff, Haim H. Permuter

    Abstract: The secrecy capacity of the type II wiretap channel (WTC II) with a noisy main channel is currently an open problem. Herein its secrecy-capacity is derived and shown to be equal to its semantic-security (SS) capacity. In this setting, the legitimate users communicate via a discrete-memoryless (DM) channel in the presence of an eavesdropper that has perfect access to a subset of its choosing of the… ▽ More

    Submitted 17 August, 2016; v1 submitted 11 September, 2015; originally announced September 2015.

    Journal ref: IEEE Transactions in Information Theory, Vol. 62, No. 7, July 2016

  15. A Stronger Soft-Covering Lemma and Applications

    Authors: Paul Cuff

    Abstract: Wyner's soft-covering lemma is a valuable tool for achievability proofs of information theoretic security, resolvability, channel synthesis, and source coding. The result herein sharpens the claim of soft-covering by moving away from an expected value analysis. Instead, a random codebook is shown to achieve the soft-covering phenomenon with high probability. The probability of failure is doubly-ex… ▽ More

    Submitted 7 August, 2015; originally announced August 2015.

    Comments: IEEE CNS 2015, 2nd Workshop on Physical-layer Methods for Wireless Security, 4 pages

    MSC Class: 94A15 ACM Class: H.1.1

  16. arXiv:1506.00194  [pdf, other

    cs.IT

    Secure Cascade Channel Synthesis

    Authors: Sanket Satpathy, Paul Cuff

    Abstract: We consider the problem of generating correlated random variables in a distributed fashion, where communication is constrained to a cascade network. The first node in the cascade observes an i.i.d. sequence $X^n$ locally before initiating communication along the cascade. All nodes share bits of common randomness that are independent of $X^n$. We consider secure synthesis - random variables produce… ▽ More

    Submitted 9 June, 2016; v1 submitted 31 May, 2015; originally announced June 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  17. arXiv:1506.00193  [pdf, ps, other

    cs.IT

    Gaussian Secure Source Coding and Wyner's Common Information

    Authors: Sanket Satpathy, Paul Cuff

    Abstract: We study secure source-coding with causal disclosure, under the Gaussian distribution. The optimality of Gaussian auxiliary random variables is shown in various scenarios. We explicitly characterize the tradeoff between the rates of communication and secret key. This tradeoff is the result of a mutual information optimization under Markov constraints. As a corollary, we deduce a general formula fo… ▽ More

    Submitted 14 June, 2015; v1 submitted 31 May, 2015; originally announced June 2015.

    Comments: ISIT 2015, 5 pages, uses IEEEtran.cls

  18. Resolvability in Eγ with Applications to Lossy Compression and Wiretap Channels

    Authors: **gbo Liu, Paul Cuff, Sergio Verdú

    Abstract: We study the amount of randomness needed for an input process to approximate a given output distribution of a channel in the $E_γ$ distance. A general one-shot achievability bound for the precision of such an approximation is developed. In the i.i.d.~setting where $γ=\exp(nE)$, a (nonnegative) randomness rate above… ▽ More

    Submitted 30 May, 2015; originally announced June 2015.

    Comments: ISIT 2015

    Journal ref: 2015 IEEE International Symposium on Information Theory (ISIT), 14-19 June 2015, pages: 755 - 759, Hong Kong

  19. arXiv:1504.05538  [pdf, ps, other

    cs.IT

    Joint Source-Channel Secrecy Using Hybrid Coding

    Authors: Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: The secrecy performance of a source-channel model is studied in the context of lossy source compression over a noisy broadcast channel. The source is causally revealed to the eavesdropper during decoding. The fidelity of the transmission to the legitimate receiver and the secrecy performance at the eavesdropper are both measured by a distortion metric. Two achievability schemes using the technique… ▽ More

    Submitted 23 June, 2015; v1 submitted 21 April, 2015; originally announced April 2015.

    Comments: 5 pages, 1 figure, ISIT 2015

  20. Secret Key Generation with One Communicator and a One-Shot Converse via Hypercontractivity

    Authors: **gbo Liu, Paul Cuff, Sergio Verdu

    Abstract: A new model of multi-party secret key agreement is proposed, in which one terminal called the communicator can transmit public messages to other terminals before all terminals agree on a secret key. A single-letter characterization of the achievable region is derived in the stationary memoryless case. The new model generalizes some other (old and new) models of key agreement. In particular, key ge… ▽ More

    Submitted 22 April, 2015; v1 submitted 21 April, 2015; originally announced April 2015.

    Comments: slightly extended version of ISIT 2015 paper

    Journal ref: Proc. 2015 IEEE Int. Symposium on Information Theory, Hong-Kong, June 15--19, 2015, pp 1457--1461

  21. One-Shot Mutual Covering Lemma and Marton's Inner Bound with a Common Message

    Authors: **gbo Liu, Paul Cuff, Sergio Verdu

    Abstract: By develo** one-shot mutual covering lemmas, we derive a one-shot achievability bound for broadcast with a common message which recovers Marton's inner bound (with three auxiliary random variables) in the i.i.d.~case. The encoder employed is deterministic. Relationship between the mutual covering lemma and a new type of channel resolvability problem is discussed.

    Submitted 6 June, 2015; v1 submitted 15 April, 2015; originally announced April 2015.

    Comments: 6 pages; extended version of ISIT paper

    Journal ref: 2015 IEEE International Symposium on Information Theory (ISIT), 14-19 June 2015, pages: 1457 - 1461, Hong Kong

  22. arXiv:1411.0060  [pdf, ps, other

    cs.IT

    Secrecy in Cascade Networks

    Authors: Paul Cuff

    Abstract: We consider a cascade network where a sequence of nodes each send a message to their downstream neighbor to enable coordination, the first node having access to an information signal. An adversary also receives all of the communication as well as additional side-information. The performance of the system is measured by a payoff function evaluated on actions produced at each of the nodes, including… ▽ More

    Submitted 31 October, 2014; originally announced November 2014.

    Comments: ITW Sept. 2013, 5 pages, uses IEEEtran.cls

    MSC Class: 94A15 ACM Class: H.1.1

  23. arXiv:1410.2881  [pdf, other

    cs.IT

    The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List

    Authors: Curt Schieler, Paul Cuff

    Abstract: We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this work we suppose that an eavesdropper produces a list of $2^{nR_{\sf L}}$ reconstruction sequences and measure secrecy by the minimum distortion o… ▽ More

    Submitted 23 November, 2014; v1 submitted 10 October, 2014; originally announced October 2014.

    Comments: Submitted to IEEE Transactions on Information Theory. Updated version with citation typo fixed

  24. arXiv:1410.1002  [pdf, ps, other

    cs.IT

    A Rate-Distortion Based Secrecy System with Side Information at the Decoders

    Authors: Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: A secrecy system with side information at the decoders is studied in the context of lossy source compression over a noiseless broadcast channel. The decoders have access to different side information sequences that are correlated with the source. The fidelity of the communication to the legitimate receiver is measured by a distortion metric, as is traditionally done in the Wyner-Ziv problem. The s… ▽ More

    Submitted 3 October, 2014; originally announced October 2014.

    Comments: 8 pages. Allerton 2014

  25. arXiv:1409.7047  [pdf, other

    cs.NI

    Cooperative Caching based on File Popularity Ranking in Delay Tolerant Networks

    Authors: Tiance Wang, Pan Hui, Sanjeev Kulkarni, Paul Cuff

    Abstract: Increasing storage sizes and WiFi/Bluetooth capabilities of mobile devices have made them a good platform for opportunistic content sharing. In this work we propose a network model to study this in a setting with two characteristics: 1. delay tolerant; 2. lack of infrastructure. Mobile users generate requests and opportunistically download from other users they meet, via Bluetooth or WiFi. The dif… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: 6 pages, 2 figures, ExtremeCom 2012

  26. arXiv:1409.6831  [pdf, other

    cs.AI cs.CR

    The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy

    Authors: Shang Shang, Tiance Wang, Paul Cuff, Sanjeev Kulkarni

    Abstract: The potential risk of privacy leakage prevents users from sharing their honest opinions on social platforms. This paper addresses the problem of privacy preservation if the query returns the histogram of rankings. The framework of differential privacy is applied to rank aggregation. The error probability of the aggregated ranking is analyzed as a result of noise added in order to achieve different… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: Fusion 2014

  27. An Upper Bound on the Convergence Time for Quantized Consensus of Arbitrary Static Graphs

    Authors: Shang Shang, Paul Cuff, Pan Hui, Sanjeev Kulkarni

    Abstract: We analyze a class of distributed quantized consensus algorithms for arbitrary static networks. In the initial setting, each node in the network has an integer value. Nodes exchange their current estimate of the mean value in the network, and then update their estimation by communicating with their neighbors in a limited capacity channel in an asynchronous clock setting. Eventually, all nodes reac… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: to appear in IEEE Trans. on Automatic Control, January, 2015. arXiv admin note: substantial text overlap with arXiv:1208.0788

    Journal ref: IEEE Trans. on Automatic Control, 60(4):1127-32, April, 2015

  28. arXiv:1409.5844  [pdf, ps, other

    cs.IT cs.CR

    Key Capacity for Product Sources with Application to Stationary Gaussian Processes

    Authors: **gbo Liu, Paul Cuff, Sergio Verdú

    Abstract: We show that for product sources, rate splitting is optimal for secret key agreement using limited one-way communication between two terminals. This yields an alternative information-theoretic-converse-style proof of the tensorization property of a strong data processing inequality originally studied by Erkip and Cover and amended recently by Anantharam et al. We derive a water-filling solution of… ▽ More

    Submitted 24 April, 2016; v1 submitted 19 September, 2014; originally announced September 2014.

    Comments: Presented in part at 2014 IEEE International Symposium on Information Theory (ISIT)

    Journal ref: IEEE Trans. on Information Theory, vol. 62, no. 2, pp. 984--1005, Feb. 2016

  29. The Likelihood Encoder for Lossy Compression

    Authors: Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: A likelihood encoder is studied in the context of lossy source compression. The analysis of the likelihood encoder is based on the soft-covering lemma. It is demonstrated that the use of a likelihood encoder together with the soft-covering lemma yields simple achievability proofs for classical source coding problems. The cases of the point-to-point rate-distortion function, the rate-distortion fun… ▽ More

    Submitted 5 April, 2016; v1 submitted 20 August, 2014; originally announced August 2014.

    Journal ref: IEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1836-1849, April 2016

  30. Key Capacity with Limited One-Way Communication for Product Sources

    Authors: **gbo Liu, Paul Cuff, Sergio Verdú

    Abstract: We show that for product sources, rate splitting is optimal for secret key agreement using limited one-way communication at two terminals. This yields an alternative proof of the tensorization property of a strong data processing inequality originally studied by Erkip and Cover and amended recently by Anantharam et al. We derive a `water-filling' solution of the communication-rate--key-rate tradeo… ▽ More

    Submitted 28 May, 2014; originally announced May 2014.

    Comments: 5 pages, ISIT 2014

    Journal ref: 2014 IEEE International Symposium on Information Theory (ISIT), pages: 1146 - 1150, June 29-July 4 2014, Honolulu, HI

  31. arXiv:1404.7164  [pdf, ps, other

    cs.IT

    Secure Coordination with a Two-Sided Helper

    Authors: Sanket Satpathy, Paul Cuff

    Abstract: We investigate the problem of secure source coding with a two-sided helper in a game-theoretic framework. Alice (A) and Helen (H) view iid correlated information sequences $X^n$ and $Y^n$ respectively. Alice communicates to Bob (B) at rate $R$, while H broadcasts a message to both A and B at rate $R_H$. Additionally, A and B share secret key $K$ at rate $R_0$ that is independent of $(X^n,Y^n)$. An… ▽ More

    Submitted 29 April, 2014; v1 submitted 28 April, 2014; originally announced April 2014.

    Comments: ISIT 2014, 5 pages, uses IEEEtran.cls

  32. arXiv:1404.5683  [pdf, ps, other

    cs.IT

    The Likelihood Encoder for Lossy Source Compression

    Authors: Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: In this work, a likelihood encoder is studied in the context of lossy source compression. The analysis of the likelihood encoder is based on a soft-covering lemma. It is demonstrated that the use of a likelihood encoder together with the soft-covering lemma gives alternative achievability proofs for classical source coding problems. The case of the rate-distortion function with side information at… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

    Comments: 5 pages, 2 figures, ISIT 2014

  33. arXiv:1307.8327  [pdf, ps, other

    cs.IT

    The Likelihood Encoder for Source Coding

    Authors: Paul Cuff, Eva C. Song

    Abstract: The likelihood encoder with a random codebook is demonstrated as an effective tool for source coding. Coupled with a soft covering lemma (associated with channel resolvability), likelihood encoders yield simple achievability proofs for known results, such as rate-distortion theory. They also produce a tractable analysis for secure rate-distortion theory and strong coordination.

    Submitted 31 July, 2013; originally announced July 2013.

    Comments: ITW Sept. 2013, invited, 2 pages, uses IEEEtran.cls

    MSC Class: 94A15 ACM Class: H.1.1

  34. arXiv:1307.7770  [pdf, ps, other

    cs.IT

    A Connection between Good Rate-distortion Codes and Backward DMCs

    Authors: Curt Schieler, Paul Cuff

    Abstract: Let $X^n\in\mathcal{X}^n$ be a sequence drawn from a discrete memoryless source, and let $Y^n\in\mathcal{Y}^n$ be the corresponding reconstruction sequence that is output by a good rate-distortion code. This paper establishes a property of the joint distribution of $(X^n,Y^n)$. It is shown that for $D>0$, the input-output statistics of a $R(D)$-achieving rate-distortion code converge (in normalize… ▽ More

    Submitted 29 July, 2013; originally announced July 2013.

    Comments: ITW 2013, 5 pages

  35. arXiv:1307.7365  [pdf, other

    cs.CR cs.IT

    A Bit of Secrecy for Gaussian Source Compression

    Authors: Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: In this paper, the compression of an independent and identically distributed Gaussian source sequence is studied in an unsecure network. Within a game theoretic setting for a three-party noiseless communication network (sender Alice, legitimate receiver Bob, and eavesdropper Eve), the problem of how to efficiently compress a Gaussian source with limited secret key in order to guarantee that Bob ca… ▽ More

    Submitted 28 July, 2013; originally announced July 2013.

  36. arXiv:1305.4314  [pdf, ps, other

    cs.IT

    Secure Cascade Channel Synthesis

    Authors: Sanket Satpathy, Paul Cuff

    Abstract: We investigate channel synthesis in a cascade setting where nature provides an iid sequence $X^n$ at node 1. Node 1 can send a message at rate $R_1$ to node 2 and node 2 can send a message at rate $R_2$ to node 3. Additionally, all 3 nodes share bits of common randomness at rate $R_0$. We want to generate sequences $Y^n$ and $Z^n$ along nodes in the cascade such that $(X^n,Y^n,Z^n)$ appears to be… ▽ More

    Submitted 18 May, 2013; originally announced May 2013.

    Comments: ISIT 2013, 5 pages, uses IEEEtran.cls

  37. arXiv:1305.3905  [pdf, other

    cs.IT cs.CR

    Rate-Distortion Theory for Secrecy Systems

    Authors: Curt Schieler, Paul Cuff

    Abstract: Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, t… ▽ More

    Submitted 10 October, 2014; v1 submitted 16 May, 2013; originally announced May 2013.

    Comments: Update version, to appear in IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. on Inf. Theory, 60(12):7584-605, December, 2014

  38. arXiv:1305.0540  [pdf, other

    cs.IR

    Privacy Preserving Recommendation System Based on Groups

    Authors: Shang Shang, Yuk Hui, Pan Hui, Paul Cuff, Sanjeev Kulkarni

    Abstract: Recommendation systems have received considerable attention in the recent decades. Yet with the development of information technology and social media, the risk in revealing private data to service providers has been a growing concern to more and more users. Trade-offs between quality and privacy in recommendation systems naturally arise. In this paper, we present a privacy preserving recommendati… ▽ More

    Submitted 13 May, 2013; v1 submitted 2 May, 2013; originally announced May 2013.

  39. Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber

    Authors: Eva C. Song, Emina Soljanin, Paul Cuff, H. Vincent Poor, Kyle Guan

    Abstract: Optical networks are vulnerable to physical layer attacks; wiretappers can improperly receive messages intended for legitimate recipients. Our work considers an aspect of this security problem within the domain of multimode fiber (MMF) transmission. MMF transmission can be modeled via a broadcast channel in which both the legitimate receiver's and wiretapper's channels are multiple-input-multiple-… ▽ More

    Submitted 29 December, 2013; v1 submitted 15 April, 2013; originally announced April 2013.

    Comments: 30 pages, 5 figures, accepted to IEEE Transactions on Communications

    Journal ref: IEEE Trans. on Communications, 62(3):1080-90, March, 2014

  40. arXiv:1303.2149  [pdf, ps, other

    cs.IT

    Optimal Equivocation in Secrecy Systems a Special Case of Distortion-based Characterization

    Authors: Paul Cuff

    Abstract: Recent work characterizing the optimal performance of secrecy systems has made use of a distortion-like metric for partial secrecy as a replacement for the more traditional metric of equivocation. In this work we use the log-loss function to show that the optimal performance limits characterized by equivocation are, in fact, special cases of distortion-based counterparts. This observation illumina… ▽ More

    Submitted 8 March, 2013; originally announced March 2013.

    Comments: Invited to ITA 2013, 3 pages, no figures, using IEEEtran.cls

    MSC Class: 94A62 ACM Class: H.1.1

  41. arXiv:1210.1549  [pdf, ps, other

    cs.IT

    Source-Channel Secrecy with Causal Disclosure

    Authors: Curt Schieler, Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consists of a source and a broadcast (wiretap) channel, and lossless reproduction of the source sequence at the legitimate receiver is required. A key aspec… ▽ More

    Submitted 6 October, 2012; v1 submitted 4 October, 2012; originally announced October 2012.

    Comments: Allerton 2012, 6 pages. Updated version includes acknowledgements

  42. Distributed Channel Synthesis

    Authors: Paul Cuff

    Abstract: Two familiar notions of correlation are rediscovered as the extreme operating points for distributed synthesis of a discrete memoryless channel, in which a stochastic channel output is generated based on a compressed description of the channel input. Wyner's common information is the minimum description rate needed. However, when common randomness independent of the input is available, the necessa… ▽ More

    Submitted 20 August, 2013; v1 submitted 21 August, 2012; originally announced August 2012.

    Comments: To appear in IEEE Trans. on Information Theory (submitted Aug., 2012, accepted July, 2013), 26 pages, using IEEEtran.cls

    MSC Class: 94A15 ACM Class: H.1.1

    Journal ref: IEEE Trans. on Inf. Theory, 59(11):7071-96, November, 2013

  43. arXiv:1208.4414  [pdf, ps, other

    math.PR cs.IT

    A Lattice of Gambles

    Authors: Paul Cuff, Thomas Cover, Gowtham Kumar, Lei Zhao

    Abstract: A gambler walks into a hypothetical fair casino with a very real dollar bill, but by the time he leaves he's exchanged the dollar for a random amount of money. What is lost in the process? It may be that the gambler walks out at the end of the day, after a roller-coaster ride of winning and losing, with his dollar still intact, or maybe even with two dollars. But what the gambler loses the moment… ▽ More

    Submitted 21 August, 2012; originally announced August 2012.

    Comments: ISIT 2011, 5 pages, 2 eps figures, uses IEEEtran.cls

  44. arXiv:1208.0788  [pdf, other

    stat.AP cs.DC cs.PF math.OC

    An Upper Bound on the Convergence Time for Quantized Consensus

    Authors: Shang Shang, Paul W. Cuff, Pan Hui, Sanjeev R. Kulkarni

    Abstract: We analyze a class of distributed quantized consen- sus algorithms for arbitrary networks. In the initial setting, each node in the network has an integer value. Nodes exchange their current estimate of the mean value in the network, and then update their estimation by communicating with their neighbors in a limited capacity channel in an asynchronous clock setting. Eventually, all nodes reach con… ▽ More

    Submitted 17 May, 2013; v1 submitted 3 August, 2012; originally announced August 2012.

    Comments: submitted to IEEE Transactions on Automatic Control, 23 pages

  45. arXiv:1208.0787  [pdf, other

    cs.IR cs.LG

    A Random Walk Based Model Incorporating Social Information for Recommendations

    Authors: Shang Shang, Sanjeev R. Kulkarni, Paul W. Cuff, Pan Hui

    Abstract: Collaborative filtering (CF) is one of the most popular approaches to build a recommendation system. In this paper, we propose a hybrid collaborative filtering model based on a Makovian random walk to address the data sparsity and cold start problems in recommendation systems. More precisely, we construct a directed graph whose nodes consist of items and users, together with item content, user pro… ▽ More

    Submitted 17 May, 2013; v1 submitted 3 August, 2012; originally announced August 2012.

    Comments: 2012 IEEE Machine Learning for Signal Processing Workshop (MLSP), 6 pages

  46. arXiv:1208.0782  [pdf, other

    cs.IR cs.LG cs.SI physics.soc-ph

    Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models

    Authors: Shang Shang, Pan Hui, Sanjeev R. Kulkarni, Paul W. Cuff

    Abstract: Recommendation systems have received considerable attention recently. However, most research has been focused on improving the performance of collaborative filtering (CF) techniques. Social networks, indispensably, provide us extra information on people's preferences, and should be considered and deployed to improve the quality of recommendations. In this paper, we propose two recommendation model… ▽ More

    Submitted 17 May, 2013; v1 submitted 3 August, 2012; originally announced August 2012.

    Comments: HotPost 2011, 6 pages

  47. arXiv:1208.0525  [pdf, other

    cs.PF

    An Upper Bound on the Convergence Time for Distributed Binary Consensus

    Authors: Shang Shang, Paul W. Cuff, Sanjeev R. Kulkarni, Pan Hui

    Abstract: The problem addressed in this paper is the analysis of a distributed consensus algorithm for arbitrary networks, proposed by Bénézit et al.. In the initial setting, each node in the network has one of two possible states ("yes" or "no"). Nodes can update their states by communicating with their neighbors via a 2-bit message in an asynchronous clock setting. Eventually, all nodes reach consensus on… ▽ More

    Submitted 17 May, 2013; v1 submitted 2 August, 2012; originally announced August 2012.

    Comments: 15th International Conference on Information Fusion, July 2012, 7 pages

  48. arXiv:1205.3853  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Is Cheap if the Adversary Must Reconstruct

    Authors: Curt Schieler, Paul Cuff

    Abstract: A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here we show that when an eavesdropper attempts to reconstruct an information sequence, as posed in the literature by Yamamoto, very little secret key is… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

    Comments: ISIT 2012, 5 pages

  49. arXiv:1110.0425  [pdf, other

    cs.IT

    Hybrid Codes Needed for Coordination over the Point-to-Point Channel

    Authors: Paul Cuff, Curt Schieler

    Abstract: We consider a new fundamental question regarding the point-to-point memoryless channel. The source-channel separation theorem indicates that random codebook construction for lossy source compression and channel coding can be independently constructed and paired to achieve optimal performance for coordinating a source sequence with a reconstruction sequence. But what if we want the channel input to… ▽ More

    Submitted 3 October, 2011; originally announced October 2011.

    Comments: Allerton 2011, 5 pages, 1 figure, uses IEEEtran.cls

  50. arXiv:1108.3652  [pdf, ps, other

    cs.IT

    Coordination using Implicit Communication

    Authors: Paul Cuff, Lei Zhao

    Abstract: We explore a basic noise-free signaling scenario where coordination and communication are naturally merged. A random signal X_1,...,X_n is processed to produce a control signal or action sequence A_1,...,A_n, which is observed and further processed (without access to X_1,...,X_n) to produce a third sequence B_1,...,B_n. The object of interest is the set of empirical joint distributions p(x,a,b) th… ▽ More

    Submitted 18 August, 2011; originally announced August 2011.

    Comments: ITW 2011, 5 pages, 1 eps figure, uses IEEEtran.cls

    MSC Class: 94A15 ACM Class: H.1.1