Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression

In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2019-11, Vol.14 (11), p.3042-3056
Hauptverfasser: Santoso, Bagus, Oohama, Yasutada
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3056
container_issue 11
container_start_page 3042
container_title IEEE transactions on information forensics and security
container_volume 14
creator Santoso, Bagus
Oohama, Yasutada
description In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.
doi_str_mv 10.1109/TIFS.2019.2907464
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2253461850</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8673888</ieee_id><sourcerecordid>2253461850</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</originalsourceid><addsrcrecordid>eNo9kFFLwzAUhYMoOKc_QHwJ-NyZpE2aPI666XCgsA0fQ5ommrE2Neke-u9t2djTPVzOOffyAfCI0QxjJF62q-VmRhAWMyJQnrHsCkwwpSxhiODri8bpLbiLcY9QlmHGJ6DeGB2M7uG8bg_OOq065xvoLXx1sQuuPHamgotGh74d1cYfgzYRfrvuFxY-BHNQ4_7D9BHuomt-4JePXXJODF1J4es2mBgHfQ9urDpE83CeU7BbLrbFe7L-fFsV83WiiUi7hClEcqppVeEMYVVhkhMmMpQqU5JSaMsrK3KB1DCxZpRaw3HJK06QrYzl6RQ8n3rb4P-OJnZyP_zdDCclITTNGOYUDS58cungYwzGyja4WoVeYiRHqnKkKkeq8kx1yDydMs4Yc_Fzlqec8_Qf3rB1ZQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2253461850</pqid></control><display><type>article</type><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><source>IEEE Electronic Library (IEL)</source><creator>Santoso, Bagus ; Oohama, Yasutada</creator><creatorcontrib>Santoso, Bagus ; Oohama, Yasutada</creatorcontrib><description>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2019.2907464</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>affine encoders ; Algorithms ; Coders ; Communication channels ; Correlation ; Decoding ; Distributed encryption ; Encryption ; Lower bounds ; Reliability ; secrecy amplification ; Slepian-Wolf network ; Solution strengthening</subject><ispartof>IEEE transactions on information forensics and security, 2019-11, Vol.14 (11), p.3042-3056</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</citedby><cites>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</cites><orcidid>0000-0003-4604-305X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8673888$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8673888$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Santoso, Bagus</creatorcontrib><creatorcontrib>Oohama, Yasutada</creatorcontrib><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</description><subject>affine encoders</subject><subject>Algorithms</subject><subject>Coders</subject><subject>Communication channels</subject><subject>Correlation</subject><subject>Decoding</subject><subject>Distributed encryption</subject><subject>Encryption</subject><subject>Lower bounds</subject><subject>Reliability</subject><subject>secrecy amplification</subject><subject>Slepian-Wolf network</subject><subject>Solution strengthening</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kFFLwzAUhYMoOKc_QHwJ-NyZpE2aPI666XCgsA0fQ5ommrE2Neke-u9t2djTPVzOOffyAfCI0QxjJF62q-VmRhAWMyJQnrHsCkwwpSxhiODri8bpLbiLcY9QlmHGJ6DeGB2M7uG8bg_OOq065xvoLXx1sQuuPHamgotGh74d1cYfgzYRfrvuFxY-BHNQ4_7D9BHuomt-4JePXXJODF1J4es2mBgHfQ9urDpE83CeU7BbLrbFe7L-fFsV83WiiUi7hClEcqppVeEMYVVhkhMmMpQqU5JSaMsrK3KB1DCxZpRaw3HJK06QrYzl6RQ8n3rb4P-OJnZyP_zdDCclITTNGOYUDS58cungYwzGyja4WoVeYiRHqnKkKkeq8kx1yDydMs4Yc_Fzlqec8_Qf3rB1ZQ</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Santoso, Bagus</creator><creator>Oohama, Yasutada</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-4604-305X</orcidid></search><sort><creationdate>20191101</creationdate><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><author>Santoso, Bagus ; Oohama, Yasutada</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>affine encoders</topic><topic>Algorithms</topic><topic>Coders</topic><topic>Communication channels</topic><topic>Correlation</topic><topic>Decoding</topic><topic>Distributed encryption</topic><topic>Encryption</topic><topic>Lower bounds</topic><topic>Reliability</topic><topic>secrecy amplification</topic><topic>Slepian-Wolf network</topic><topic>Solution strengthening</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Santoso, Bagus</creatorcontrib><creatorcontrib>Oohama, Yasutada</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Santoso, Bagus</au><au>Oohama, Yasutada</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-11-01</date><risdate>2019</risdate><volume>14</volume><issue>11</issue><spage>3042</spage><epage>3056</epage><pages>3042-3056</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2019.2907464</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-4604-305X</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2019-11, Vol.14 (11), p.3042-3056
issn 1556-6013
1556-6021
language eng
recordid cdi_proquest_journals_2253461850
source IEEE Electronic Library (IEL)
subjects affine encoders
Algorithms
Coders
Communication channels
Correlation
Decoding
Distributed encryption
Encryption
Lower bounds
Reliability
secrecy amplification
Slepian-Wolf network
Solution strengthening
title Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T16%3A10%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Amplification%20of%20Distributed%20Encrypted%20Sources%20With%20Correlated%20Keys%20Using%20Post-Encryption-Compression&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Santoso,%20Bagus&rft.date=2019-11-01&rft.volume=14&rft.issue=11&rft.spage=3042&rft.epage=3056&rft.pages=3042-3056&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2019.2907464&rft_dat=%3Cproquest_RIE%3E2253461850%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2253461850&rft_id=info:pmid/&rft_ieee_id=8673888&rfr_iscdi=true