Preserving Privacy while Broadcasting: k-Limited-Access Schemes

Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

5 Citations (Scopus)

Abstract

Index coding employs coding across clients within the same broadcast domain. This typically assumes that all clients learn the coding matrix so that they can decode and retrieve their requested data. However, learning the coding matrix can pose privacy concerns: it may enable clients to infer information about the requests and side information of other clients [1]. In this paper, we formalize the intuition that the achieved privacy can increase by decreasing the number of rows of the coding matrix that a client learns. Based on this, we propose the use of k-limited-access schemes: given an index coding scheme that employs Τ transmissions, we create a k-limited-access scheme with Tk ≥ T transmissions, and with the property that each client learns at most k rows of the coding matrix to decode its message. We derive upper and lower bounds on Tk for all values of k, and develop deterministic designs for these schemes for which Tk has an order-optimal exponent for some regimes.
Original languageEnglish
Title of host publication2017 IEEE Information Theory Workshop (ITW)
PublisherIEEE
Pages514-518
ISBN (Electronic)9781509030972, 9781509030965
ISBN (Print)9781509030989
DOIs
Publication statusPublished - Nov 2017
Externally publishedYes
Event2017 IEEE Information Theory Workshop (ITW 2017) - Kaohsiung Exhibition Center (KEC), Kaohsiung, Taiwan, China
Duration: 6 Nov 201710 Nov 2017
http://www.itw2017.org/

Publication series

NameProceedings IEEE International Symposium on Information Theory
PublisherIEEE
ISSN (Print)2157-8095

Conference

Conference2017 IEEE Information Theory Workshop (ITW 2017)
Abbreviated titleITW 2017
PlaceTaiwan, China
CityKaohsiung
Period6/11/1710/11/17
Internet address

Fingerprint

Dive into the research topics of 'Preserving Privacy while Broadcasting: k-Limited-Access Schemes'. Together they form a unique fingerprint.

Cite this