We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.IT

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Information Theory

Title: Secure Group Testing

Abstract: The principal goal of Group Testing (GT) is to identify a small subset of "defective" items from a large population, by grouping items into as few test pools as possible. The test outcome of a pool is positive if it contains at least one defective item, and is negative otherwise. GT algorithms are utilized in numerous applications, and in many of them maintaining the privacy of the tested items, namely, keeping secret whether they are defective or not, is critical.
In this paper, we consider a scenario where there is an eavesdropper (Eve) who is able to observe a subset of the GT outcomes (pools). We propose a new non-adaptive Secure Group Testing (SGT) scheme based on information-theoretic principles. The new proposed test design keeps the eavesdropper ignorant regarding the items' status. Specifically, when the fraction of tests observed by Eve is $0 \leq \delta <1$, we prove that with the naive Maximum Likelihood (ML) decoding algorithm the number of tests required for both correct reconstruction at the legitimate user (with high probability) and negligible information leakage to Eve is $\frac{1}{1-\delta}$ times the number of tests required with no secrecy constraint for the fixed $K$ regime. By a matching converse, we completely characterize the Secure GT capacity. Moreover, we consider the Definitely Non-Defective (DND) computationally efficient decoding algorithm, proposed in the literature for non-secure GT. We prove that with the new secure test design, for $\delta < 1/2$, the number of tests required, without any constraint on $K$, is at most $\frac{1}{1/2-\delta}$ times the number of tests required with no secrecy constraint.
Subjects: Information Theory (cs.IT)
Cite as: arXiv:1607.04849 [cs.IT]
  (or arXiv:1607.04849v5 [cs.IT] for this version)

Submission history

From: Alejandro Cohen [view email]
[v1] Sun, 17 Jul 2016 10:50:09 GMT (150kb,D)
[v2] Thu, 13 Apr 2017 13:12:47 GMT (1269kb,D)
[v3] Tue, 16 Jan 2018 08:30:08 GMT (1507kb,D)
[v4] Fri, 24 Apr 2020 18:40:08 GMT (1715kb,D)
[v5] Wed, 12 Aug 2020 02:08:36 GMT (1609kb,D)

Link back to: arXiv, form interface, contact.