-
Statistics of Random Binning Based on Tsallis Divergence
Authors:
Masoud Kavian,
Mohammad Mahdi Mojahedian,
Mohammad Hossein Yassaee,
Mahtab Mirmohseni,
Mohammad Reza Aref
Abstract:
Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the…
▽ More
Random binning is a widely utilized tool in information theory, finding applications in various domains. In this paper, we focus on the output statistics of random binning (OSRB) using the Tsallis divergence $T_α$. Our investigation encompasses all values of $α$ within the range of $(0,\infty)$. The proofs provided in this paper cover both the achievability and converse aspects. To accommodate the unbounded nature of $T_\infty$, we analyze the OSRB framework using the Rényi's divergence criterion with the order of infinity, denoted as $D_\infty$. During our exploration of OSRB, we encounter a specific form of Rényi's conditional entropy and delve into its properties. Additionally, we demonstrate the effectiveness of this framework in establishing achievability results for wiretap channel, where Tsallis divergence serves as a security measure.
△ Less
Submitted 13 February, 2024; v1 submitted 25 April, 2023;
originally announced April 2023.
-
Adjustable Privacy using Autoencoder-based Learning Structure
Authors:
Mohammad Ali Jamshidi,
Hadi Veisi,
Mohammad Mahdi Mojahedian,
Mohammad Reza Aref
Abstract:
Inference centers need more data to have a more comprehensive and beneficial learning model, and for this purpose, they need to collect data from data providers. On the other hand, data providers are cautious about delivering their datasets to inference centers in terms of privacy considerations. In this paper, by modifying the structure of the autoencoder, we present a method that manages the uti…
▽ More
Inference centers need more data to have a more comprehensive and beneficial learning model, and for this purpose, they need to collect data from data providers. On the other hand, data providers are cautious about delivering their datasets to inference centers in terms of privacy considerations. In this paper, by modifying the structure of the autoencoder, we present a method that manages the utility-privacy trade-off well. To be more precise, the data is first compressed using the encoder, then confidential and non-confidential features are separated and uncorrelated using the classifier. The confidential feature is appropriately combined with noise, and the non-confidential feature is enhanced, and at the end, data with the original data format is produced by the decoder. The proposed architecture also allows data providers to set the level of privacy required for confidential features. The proposed method has been examined for both image and categorical databases, and the results show a significant performance improvement compared to previous methods.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
A Correlation Measure Based on Vector-Valued $L_p$-Norms
Authors:
Mohammad Mahdi Mojahedian,
Salman Beigi,
Amin Gohari,
Mohammad Hossein Yassaee,
Mohammad Reza Aref
Abstract:
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this meas…
▽ More
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this measure of correlation, and present some applications in privacy amplification as well as in bounding the random coding exponents. In particular, we establish a bound on the secrecy exponent of the wiretap channel (under the total variation metric) in terms of the $α$-Rényi mutual information according to \emph{Csiszár's proposal}.
△ Less
Submitted 21 May, 2018;
originally announced May 2018.
-
On the Equivalency of Reliability and Security Metrics for Wireline Networks
Authors:
Mohammad Mahdi Mojahedian,
Amin Gohari,
Mohammad Reza Aref
Abstract:
In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of "perfect secrecy and zero-error constraints" with "weak secrecy and $ε$-error constraints".
In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of "perfect secrecy and zero-error constraints" with "weak secrecy and $ε$-error constraints".
△ Less
Submitted 15 September, 2016;
originally announced September 2016.
-
Perfectly Secure Index Coding
Authors:
Mohammad Mahdi Mojahedian,
Mohammad Reza Aref,
Amin Gohari
Abstract:
In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. We…
▽ More
In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. We study the minimum key lengths for zero-error and perfectly secure index coding problem. On one hand, this problem is a generalization of the index coding problem (and thus a difficult one). On the other hand, it is a generalization of the Shannon's cipher system. We show that a generalization of Shannon's one-time pad strategy is optimal up to a multiplicative constant, meaning that it obtains the entire boundary of the cone formed by looking at the secure rate region from the origin. Finally, we consider relaxation of the perfect secrecy and zero-error constraints to weak secrecy and asymptotically vanishing probability of error, and provide a secure version of the result, obtained by Langberg and Effros, on the equivalence of zero-error and $ε$-error regions in the conventional index coding problem.
△ Less
Submitted 30 December, 2015; v1 submitted 17 April, 2015;
originally announced April 2015.