Skip to main content

Showing 1–9 of 9 results for author: Vippathalla, P K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.12348  [pdf, ps, other

    cs.IT

    Rate-Distortion-Perception Function of Bernoulli Vector Sources

    Authors: Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon

    Abstract: In this paper, we consider the rate-distortion-perception (RDP) trade-off for the lossy compression of a Bernoulli vector source, which is a finite collection of independent binary random variables. The RDP function quantifies in a way the efficient compression of a source when we impose a distortion constraint that limits the dissimilarity between the source and the reconstruction and a perceptio… ▽ More

    Submitted 21 January, 2025; originally announced January 2025.

    Comments: 7 pages, 2 figures

  2. arXiv:2409.13003  [pdf, other

    cs.IT

    The Asymptotic Behaviour of Information Leakage Metrics

    Authors: Sophie Taylor, Praneeth Kumar Vippathalla, Justin P. Coon

    Abstract: Information theoretic leakage metrics quantify the amount of information about a private random variable $X$ that is leaked through a correlated revealed variable $Y$. They can be used to evaluate the privacy of a system in which an adversary, from whom we want to keep $X$ private, is given access to $Y$. Global information theoretic leakage metrics quantify the overall amount of information leake… ▽ More

    Submitted 13 May, 2025; v1 submitted 19 September, 2024; originally announced September 2024.

    Comments: 47 pages, 4 figures, submitted to IEEE Transactions on Information Theory

  3. arXiv:2311.09111  [pdf, ps, other

    cs.IT

    Graph Compression with Side Information at the Decoder

    Authors: Praneeth Kumar Vippathalla, Mihai-Alin Badiu, Justin P. Coon

    Abstract: In this paper, we study the problem of graph compression with side information at the decoder. The focus is on the situation when an unlabelled graph (which is also referred to as a structure) is to be compressed or is available as side information. For correlated Erdős-Rényi weighted random graphs, we give a precise characterization of the smallest rate at which a labelled graph or its structure… ▽ More

    Submitted 17 January, 2025; v1 submitted 15 November, 2023; originally announced November 2023.

    Comments: 22 pages, 2 figures

  4. arXiv:2309.14464  [pdf, other

    cs.IT cs.SI

    Rate-Distortion Function of the Stochastic Block Model

    Authors: Martin Wachiye Wafula, Praneeth Kumar Vippathalla, Justin Coon, Mihai-Alin Badiu

    Abstract: The stochastic block model (SBM) is extensively used to model networks in which users belong to certain communities. In recent years, the study of information-theoretic compression of such networks has gained attention, with works primarily focusing on lossless compression. In this work, we address the lossy compression of SBM graphs by characterizing the rate-distortion function under a Hamming d… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

    Comments: 9 pages, 1 figure, Accepted for presentation at Asilomar Conference on Signals, Systems, and Computers, 2023

  5. arXiv:2201.05995  [pdf, other

    cs.IT

    The Secure Storage Capacity of a DNA Wiretap Channel Model

    Authors: Praneeth Kumar Vippathalla, Navin Kashyap

    Abstract: In this paper, we propose a strategy for making DNA-based data storage information-theoretically secure through the use of wiretap channel coding. This motivates us to extend the shuffling-sampling channel model of Shomorony and Heckel (2021) to include a wiretapper. Our main result is a characterization of the secure storage capacity of our DNA wiretap channel model, which is the maximum rate at… ▽ More

    Submitted 24 November, 2022; v1 submitted 16 January, 2022; originally announced January 2022.

    Comments: 35 pages, 6 figures, submitted to the IEEE Transactions on Information Theory. This version includes a DNA wiretap channel with a shared key and a section on block-erasure wiretap channels

  6. arXiv:2112.00394  [pdf, ps, other

    cs.IT cs.CR

    Wiretap Secret Key Agreement Via Secure Omniscience

    Authors: Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou

    Abstract: In this paper, we explore the connection between secret key agreement and secure omniscience within the setting of the multiterminal source model with a wiretapper who has side information. While the secret key agreement problem considers the generation of a maximum-rate secret key through public discussion, the secure omniscience problem is concerned with communication protocols for omniscience t… ▽ More

    Submitted 26 July, 2023; v1 submitted 1 December, 2021; originally announced December 2021.

    Comments: 46 pages, 8 figures, submitted to the IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:2102.01771

  7. arXiv:2102.01771  [pdf, ps, other

    cs.IT

    Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper

    Authors: Praneeth Kumar Vippathalla, Chung Chan, Navin Kashyap, Qiaoqiao Zhou

    Abstract: While the wiretap secret key capacity remains unknown for general source models even in the two-user case, we obtained a single-letter characterization for a large class of multi-user source models with a linear wiretapper who can observe any linear combinations of the source. We introduced the idea of irreducible sources to show existence of an optimal communication scheme that achieves perfect o… ▽ More

    Submitted 2 February, 2021; originally announced February 2021.

    Comments: 13 pages, 2 figures

  8. arXiv:1904.11383  [pdf, ps, other

    cs.IT

    Multiterminal Secret Key Agreement with Nearly No Discussion

    Authors: Chung Chan, Manuj Mukherjee, Praneeth Kumar Vippathalla, Qiaoqiao Zhou

    Abstract: We consider the secret key agreement problem under the multiterminal source model proposed by Csiszár and Narayan. A single-letter characterization of the secrecy capacity is desired but remains unknown except in the extreme case with unlimited public discussion and without wiretapper's side information. Taking the problem to the opposite extreme by requiring the public discussion rate to be zero… ▽ More

    Submitted 25 April, 2019; originally announced April 2019.

  9. arXiv:1901.05817  [pdf, ps, other

    cs.IT

    One-Shot Perfect Secret Key Agreement for Finite Linear Sources

    Authors: Chung Chan, Navin Kashyap, Praneeth Kumar Vippathalla, Qiaoqiao Zhou

    Abstract: We consider a non-asymptotic (one-shot) version of the multiterminal secret key agreement problem on a finite linear source model. In this model, the observation of each terminal is a linear function of an underlying random vector composed of finitely many i.i.d. uniform random variables. Restricting the public discussion to be a linear function of the terminals' observations, we obtain a characte… ▽ More

    Submitted 17 January, 2019; originally announced January 2019.