Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders

01/13/2018
by   Bagus Santoso, et al.
0

This paper proposed the application of post-encryption-compression (PEC) to strengthen the secrecy in the case of distributed encryption where the encryption keys are correlated to each other. We derive the universal code construction for the compression and the rate region where codes with achievability and secrecy are obtainable. Our main technique is to use affine encoders which are constructed from certain linear encoders to encode the ciphertexts before sending them to public communication channels. We show that if the rates of linear codes are within a certain rate region:(1) information leakage on the original sources from the encoded ciphertexts without the keys is negligible, while (2) one who has legitimate keys is able to retrieve the original source data with negligible error probability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/12/2021

Distributed Source Coding with Encryption Using Correlated Keys

We pose and investigate the distributed secure source coding based on th...
research
01/17/2019

Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys

We consider the secure communication problem for broadcasting of two enc...
research
08/14/2019

Breaking the encryption scheme of the Moscow internet voting system

In September 2019, voters for the election at the Parliament of the city...
research
12/15/2020

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Memory was captured from a system infected by ransomware and its content...
research
01/03/2023

One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys

Quantum digital signatures (QDS), generating correlated bit strings amon...
research
05/09/2021

Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels

Secret-sharing building blocks based on quantum broadcast communication ...
research
02/21/2019

Manual Encryption Revisited

This document brings together several articles devoted to manual encrypt...

Please sign up or login with your details

Forgot password? Click here to reset