Distributed Source Coding with Encryption Using Correlated Keys

02/12/2021
by   Yasutada Oohama, et al.
0

We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with correlated keys using post-encryption-compression, which was posed investigated by Santoso and Oohama. In this paper we propose another new security criterion which is generally more strict compared to the commonly used security criterion which is based on the upper-bound of mutual information between the plaintext and the ciphertext. Under this criterion, we establish the necessary and sufficient condition for the secure transmission of correlated sources.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/17/2019

Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys

We consider the secure communication problem for broadcasting of two enc...
research
01/27/2022

Strong Converse Theorem for Source Encryption under Side-Channel Attacks

We are interested in investigating the security of source encryption wit...
research
01/13/2018

Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders

This paper proposed the application of post-encryption-compression (PEC)...
research
01/17/2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks

We consider the secure communication problem for broadcasting of two enc...
research
10/26/2007

The entropy of keys derived from laser speckle

Laser speckle has been proposed in a number of papers as a high-entropy ...
research
09/28/2020

A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems

The problem of A privately transmitting information to B by a public ann...
research
03/24/2020

A Comprehensive Analysis of Correlated Source Compression Using Edge Computing in Distributed Systems

This paper examines the theory pertaining to lossless compression of cor...

Please sign up or login with your details

Forgot password? Click here to reset