An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021‏ - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

Distributed channel synthesis

P Cuff - IEEE Transactions on Information Theory, 2013‏ - ieeexplore.ieee.org
Two familiar notions of correlation are rediscovered as the extreme operating points for
distributed synthesis of a discrete memoryless channel, in which a stochastic channel output …

Secure integrated sensing and communication

O Günlü, MR Bloch, RF Schaefer… - IEEE Journal on …, 2023‏ - ieeexplore.ieee.org
This work considers the problem of mitigating information leakage between communication
and sensing in systems jointly performing both operations. Specifically, a discrete …

Error-control coding for physical-layer secrecy

M Bloch, M Hayashi, A Thangaraj - Proceedings of the IEEE, 2015‏ - ieeexplore.ieee.org
The renewed interest for physical-layer security techniques has put forward a new role for
error-control codes. In addition to ensuring reliability, carefully designed codes have been …

Channel simulation: Theory and applications to lossy compression and differential privacy

CT Li - Foundations and Trends® in Communications and …, 2024‏ - nowpublishers.com
One-shot channel simulation (or channel synthesis) has seen increasing applications in
lossy compression, differential privacy and machine learning. In this setting, an encoder …

Polar coding for the broadcast channel with confidential messages: A random binning analogy

RA Chou, MR Bloch - IEEE Transactions on Information Theory, 2016‏ - ieeexplore.ieee.org
We develop a low-complexity polar coding scheme for the discrete memoryless broadcast
channel with confidential messages under strong secrecy and randomness constraints. Our …

Rate-distortion theory for secrecy systems

C Schieler, P Cuff - IEEE Transactions on Information Theory, 2014‏ - ieeexplore.ieee.org
Secrecy in communication systems is measured herein by the distortion that an adversary
incurs. The transmitter and receiver share secret key, which they use to encrypt …

The likelihood encoder for lossy compression

EC Song, P Cuff, HV Poor - IEEE Transactions on Information …, 2016‏ - ieeexplore.ieee.org
A likelihood encoder is studied in the context of lossy source compression. The analysis of
the likelihood encoder is based on the soft-covering lemma. It is demonstrated that the use …

Nonasymptotic and second-order achievability bounds for coding with side-information

S Watanabe, S Kuzuoka… - IEEE Transactions on …, 2015‏ - ieeexplore.ieee.org
We present a novel nonasymptotic or finite blocklength achievability bounds for three side-
information problems in network information theory. These include: 1) the Wyner-Ahlswede …

Communication for generating correlation: A unifying survey

M Sudan, H Tyagi, S Watanabe - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …