Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives

In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2016-10, Vol.11 (10), p.2312-2321
Hauptverfasser: Moharrer, Ali, Shuangqing Wei, Amariucai, George T., Jing Deng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2321
container_issue 10
container_start_page 2312
container_title IEEE transactions on information forensics and security
container_volume 11
creator Moharrer, Ali
Shuangqing Wei
Amariucai, George T.
Jing Deng
description In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.
doi_str_mv 10.1109/TIFS.2016.2543688
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_1808185723</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7435281</ieee_id><sourcerecordid>1835637825</sourcerecordid><originalsourceid>FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</originalsourceid><addsrcrecordid>eNpd0EFLwzAUB_AiCs7pBxAvAS9eOvOSNEm9jbHNwUDRevBUsux1dLTNTFrRb2_Hxg6e3jv8_o_HP4pugY4AaPqYLWbvI0ZBjlgiuNT6LBpAkshYUgbnpx34ZXQVwpZSIUDqQfQ5_Wm9sa1ZVUgmrq5dQ95Ms3Z1gyGQmXc1mZsuhNI0JPOI4YlkbucqtymtqUhPybja4Mqb0pJX9GGHti2_MVxHF4WpAt4c5zD6mE2zyXO8fJkvJuNlbLnQbWzXqn9FKyVBM8mFVYJqW7C1TXVqCr3CQqeFYQyFQVDAgWFKRcoTmRSFRD6MHg53d959dRjavC6DxaoyDbou5KB7ypVmSU_v_9Gt63zTf9crqkEnivFewUFZ70LwWOQ7X9bG_-ZA833Z-b7sfF92fiy7z9wdMiUinrwSPGEa-B9WEHpF</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1808185723</pqid></control><display><type>article</type><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><source>IEEE Electronic Library (IEL)</source><creator>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</creator><creatorcontrib>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</creatorcontrib><description>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2016.2543688</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Algebra ; common randomness ; Computer information security ; conditional mutual information ; Data mining ; Entropy ; Gaussian ; Gaussian trees ; Graphical models ; Mathematical analysis ; Measurement ; Mutual information ; partially ordered sets ; Polynomials ; Random variables ; Security ; Set theory ; Topology ; Trees</subject><ispartof>IEEE transactions on information forensics and security, 2016-10, Vol.11 (10), p.2312-2321</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</cites><orcidid>0000-0001-5913-1441</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7435281$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7435281$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Moharrer, Ali</creatorcontrib><creatorcontrib>Shuangqing Wei</creatorcontrib><creatorcontrib>Amariucai, George T.</creatorcontrib><creatorcontrib>Jing Deng</creatorcontrib><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</description><subject>Algebra</subject><subject>common randomness</subject><subject>Computer information security</subject><subject>conditional mutual information</subject><subject>Data mining</subject><subject>Entropy</subject><subject>Gaussian</subject><subject>Gaussian trees</subject><subject>Graphical models</subject><subject>Mathematical analysis</subject><subject>Measurement</subject><subject>Mutual information</subject><subject>partially ordered sets</subject><subject>Polynomials</subject><subject>Random variables</subject><subject>Security</subject><subject>Set theory</subject><subject>Topology</subject><subject>Trees</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpd0EFLwzAUB_AiCs7pBxAvAS9eOvOSNEm9jbHNwUDRevBUsux1dLTNTFrRb2_Hxg6e3jv8_o_HP4pugY4AaPqYLWbvI0ZBjlgiuNT6LBpAkshYUgbnpx34ZXQVwpZSIUDqQfQ5_Wm9sa1ZVUgmrq5dQ95Ms3Z1gyGQmXc1mZsuhNI0JPOI4YlkbucqtymtqUhPybja4Mqb0pJX9GGHti2_MVxHF4WpAt4c5zD6mE2zyXO8fJkvJuNlbLnQbWzXqn9FKyVBM8mFVYJqW7C1TXVqCr3CQqeFYQyFQVDAgWFKRcoTmRSFRD6MHg53d959dRjavC6DxaoyDbou5KB7ypVmSU_v_9Gt63zTf9crqkEnivFewUFZ70LwWOQ7X9bG_-ZA833Z-b7sfF92fiy7z9wdMiUinrwSPGEa-B9WEHpF</recordid><startdate>20161001</startdate><enddate>20161001</enddate><creator>Moharrer, Ali</creator><creator>Shuangqing Wei</creator><creator>Amariucai, George T.</creator><creator>Jing Deng</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><orcidid>https://orcid.org/0000-0001-5913-1441</orcidid></search><sort><creationdate>20161001</creationdate><title>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</title><author>Moharrer, Ali ; Shuangqing Wei ; Amariucai, George T. ; Jing Deng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c348t-cd74418776182634c7408cf2dc989af8bef89fa22e4ae171312e90493565ff6e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algebra</topic><topic>common randomness</topic><topic>Computer information security</topic><topic>conditional mutual information</topic><topic>Data mining</topic><topic>Entropy</topic><topic>Gaussian</topic><topic>Gaussian trees</topic><topic>Graphical models</topic><topic>Mathematical analysis</topic><topic>Measurement</topic><topic>Mutual information</topic><topic>partially ordered sets</topic><topic>Polynomials</topic><topic>Random variables</topic><topic>Security</topic><topic>Set theory</topic><topic>Topology</topic><topic>Trees</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Moharrer, Ali</creatorcontrib><creatorcontrib>Shuangqing Wei</creatorcontrib><creatorcontrib>Amariucai, George T.</creatorcontrib><creatorcontrib>Jing Deng</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Moharrer, Ali</au><au>Shuangqing Wei</au><au>Amariucai, George T.</au><au>Jing Deng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2016-10-01</date><risdate>2016</risdate><volume>11</volume><issue>10</issue><spage>2312</spage><epage>2321</epage><pages>2312-2321</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we study both topological and algebraic properties of unrooted Gaussian trees in order to characterize their security performance. Such performance is measured by the corresponding potential in extracting common randomness from a given tree, which is further determined by max-min and min-max conditional mutual information (CMI) values, subject to the order of selecting variables from the tree by legitimate nodes Alice and Bob, and an eavesdropper Eve, respectively. A new operation is proposed to transform a Gaussian tree into another, and also to order different Gaussian trees. Through such operation we construct several equivalent classes of Gaussian trees. Each class includes multiple Gaussian trees that can be partially ordered based on the associated max-min or min-max CMI metric, and thus, we can find the most secure and the least secure trees in each partially ordered set (poset). The union of all posets generates all possible non-isomorphic trees of the given number of variables. Then, we assign a particular polynomial to each Gaussian tree, and show that such polynomial can determine the relative security performance of the Gaussian tree with respect to other trees within the same class. In the end, based on a generalized integer partition method, we propose a novel approach to efficiently enumerate the most secure structures of all posets.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2016.2543688</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0001-5913-1441</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2016-10, Vol.11 (10), p.2312-2321
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_1808185723
source IEEE Electronic Library (IEL)
subjects Algebra
common randomness
Computer information security
conditional mutual information
Data mining
Entropy
Gaussian
Gaussian trees
Graphical models
Mathematical analysis
Measurement
Mutual information
partially ordered sets
Polynomials
Random variables
Security
Set theory
Topology
Trees
title Extractable Common Randomness From Gaussian Trees: Topological and Algebraic Perspectives
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T17%3A42%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Extractable%20Common%20Randomness%20From%20Gaussian%20Trees:%20Topological%20and%20Algebraic%20Perspectives&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Moharrer,%20Ali&rft.date=2016-10-01&rft.volume=11&rft.issue=10&rft.spage=2312&rft.epage=2321&rft.pages=2312-2321&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2016.2543688&rft_dat=%3Cproquest_RIE%3E1835637825%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1808185723&rft_id=info:pmid/&rft_ieee_id=7435281&rfr_iscdi=true