Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives
In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2016-10, Vol.11 (10), p.2312-2321 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2321 |
---|---|
container_issue | 10 |
container_start_page | 2312 |
container_title | IEEE transactions on information forensics and security |
container_volume | 11 |
creator | Moharrer, Ali Shuangqing Wei Amariucai, George T. Jing Deng |
description | In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets. |
doi_str_mv | 10.1109/TIFS.2016.2543688 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1808185723</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7435281</ieee_id><sourcerecordid>1835637825</sourcerecordid><originalsourceid>FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</originalsourceid><addsrcrecordid>eNpd0EFLwzAUB_AiCs7pBxAvAS9eOvOSNEm9jbHNwUDRevBUsux1dLTNTFrRb2_Hxg6e3jv8_o_HP4pugY4AaPqYLWbvI0ZBjlgiuNT6LBpAkshYUgbnpx34ZXQVwpZSIUDqQfQ5_Wm9sa1ZVUgmrq5dQ95Ms3Z1gyGQmXc1mZsuhNI0JPOI4YlkbucqtymtqUhPybja4Mqb0pJX9GGHti2_MVxHF4WpAt4c5zD6mE2zyXO8fJkvJuNlbLnQbWzXqn9FKyVBM8mFVYJqW7C1TXVqCr3CQqeFYQyFQVDAgWFKRcoTmRSFRD6MHg53d959dRjavC6DxaoyDbou5KB7ypVmSU_v_9Gt63zTf9crqkEnivFewUFZ70LwWOQ7X9bG_-ZA833Z-b7sfF92fiy7z9wdMiUinrwSPGEa-B9WEHpF</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1808185723</pqid></control><display><type>article</type><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><source>IEEE Electronic Library (IEL)</source><creator>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</creator><creatorcontrib>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</creatorcontrib><description>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2016.2543688</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algebra ; common randomness ; Computer information security ; conditional mutual information ; Data mining ; Entropy ; Gaussian ; Gaussian trees ; Graphical models ; Mathematical analysis ; Measurement ; Mutual information ; partially ordered sets ; Polynomials ; Random variables ; Security ; Set theory ; Topology ; Trees</subject><ispartof>IEEE transactions on information forensics and security, 2016-10, Vol.11 (10), p.2312-2321</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</cites><orcidid>0000-0001-5913-1441</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7435281$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7435281$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Moharrer, Ali</creatorcontrib><creatorcontrib>Shuangqing Wei</creatorcontrib><creatorcontrib>Amariucai, George T.</creatorcontrib><creatorcontrib>Jing Deng</creatorcontrib><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</description><subject>Algebra</subject><subject>common randomness</subject><subject>Computer information security</subject><subject>conditional mutual information</subject><subject>Data mining</subject><subject>Entropy</subject><subject>Gaussian</subject><subject>Gaussian trees</subject><subject>Graphical models</subject><subject>Mathematical analysis</subject><subject>Measurement</subject><subject>Mutual information</subject><subject>partially ordered sets</subject><subject>Polynomials</subject><subject>Random variables</subject><subject>Security</subject><subject>Set theory</subject><subject>Topology</subject><subject>Trees</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0EFLwzAUB_AiCs7pBxAvAS9eOvOSNEm9jbHNwUDRevBUsux1dLTNTFrRb2_Hxg6e3jv8_o_HP4pugY4AaPqYLWbvI0ZBjlgiuNT6LBpAkshYUgbnpx34ZXQVwpZSIUDqQfQ5_Wm9sa1ZVUgmrq5dQ95Ms3Z1gyGQmXc1mZsuhNI0JPOI4YlkbucqtymtqUhPybja4Mqb0pJX9GGHti2_MVxHF4WpAt4c5zD6mE2zyXO8fJkvJuNlbLnQbWzXqn9FKyVBM8mFVYJqW7C1TXVqCr3CQqeFYQyFQVDAgWFKRcoTmRSFRD6MHg53d959dRjavC6DxaoyDbou5KB7ypVmSU_v_9Gt63zTf9crqkEnivFewUFZ70LwWOQ7X9bG_-ZA833Z-b7sfF92fiy7z9wdMiUinrwSPGEa-B9WEHpF</recordid><startdate>20161001</startdate><enddate>20161001</enddate><creator>Moharrer, Ali</creator><creator>Shuangqing Wei</creator><creator>Amariucai, George T.</creator><creator>Jing Deng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><orcidid>https://orcid.org/0000-0001-5913-1441</orcidid></search><sort><creationdate>20161001</creationdate><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><author>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algebra</topic><topic>common randomness</topic><topic>Computer information security</topic><topic>conditional mutual information</topic><topic>Data mining</topic><topic>Entropy</topic><topic>Gaussian</topic><topic>Gaussian trees</topic><topic>Graphical models</topic><topic>Mathematical analysis</topic><topic>Measurement</topic><topic>Mutual information</topic><topic>partially ordered sets</topic><topic>Polynomials</topic><topic>Random variables</topic><topic>Security</topic><topic>Set theory</topic><topic>Topology</topic><topic>Trees</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Moharrer, Ali</creatorcontrib><creatorcontrib>Shuangqing Wei</creatorcontrib><creatorcontrib>Amariucai, George T.</creatorcontrib><creatorcontrib>Jing Deng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Moharrer, Ali</au><au>Shuangqing Wei</au><au>Amariucai, George T.</au><au>Jing Deng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2016-10-01</date><risdate>2016</risdate><volume>11</volume><issue>10</issue><spage>2312</spage><epage>2321</epage><pages>2312-2321</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2016.2543688</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-5913-1441</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2016-10, Vol.11 (10), p.2312-2321 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_1808185723 |
source | IEEE Electronic Library (IEL) |
subjects | Algebra common randomness Computer information security conditional mutual information Data mining Entropy Gaussian Gaussian trees Graphical models Mathematical analysis Measurement Mutual information partially ordered sets Polynomials Random variables Security Set theory Topology Trees |
title | Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T17%3A42%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Extractable%20Common%20Randomness%20From%20Gaussian%20Trees:%20Topological%20and%20Algebraic%20Perspectives&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Moharrer,%20Ali&rft.date=2016-10-01&rft.volume=11&rft.issue=10&rft.spage=2312&rft.epage=2321&rft.pages=2312-2321&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2016.2543688&rft_dat=%3Cproquest_RIE%3E1835637825%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1808185723&rft_id=info:pmid/&rft_ieee_id=7435281&rfr_iscdi=true |