Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression
In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiri...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2019-11, Vol.14 (11), p.3042-3056 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3056 |
---|---|
container_issue | 11 |
container_start_page | 3042 |
container_title | IEEE transactions on information forensics and security |
container_volume | 14 |
creator | Santoso, Bagus Oohama, Yasutada |
description | In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large. |
doi_str_mv | 10.1109/TIFS.2019.2907464 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2253461850</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8673888</ieee_id><sourcerecordid>2253461850</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</originalsourceid><addsrcrecordid>eNo9kFFLwzAUhYMoOKc_QHwJ-NyZpE2aPI666XCgsA0fQ5ommrE2Neke-u9t2djTPVzOOffyAfCI0QxjJF62q-VmRhAWMyJQnrHsCkwwpSxhiODri8bpLbiLcY9QlmHGJ6DeGB2M7uG8bg_OOq065xvoLXx1sQuuPHamgotGh74d1cYfgzYRfrvuFxY-BHNQ4_7D9BHuomt-4JePXXJODF1J4es2mBgHfQ9urDpE83CeU7BbLrbFe7L-fFsV83WiiUi7hClEcqppVeEMYVVhkhMmMpQqU5JSaMsrK3KB1DCxZpRaw3HJK06QrYzl6RQ8n3rb4P-OJnZyP_zdDCclITTNGOYUDS58cungYwzGyja4WoVeYiRHqnKkKkeq8kx1yDydMs4Yc_Fzlqec8_Qf3rB1ZQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2253461850</pqid></control><display><type>article</type><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><source>IEEE Electronic Library (IEL)</source><creator>Santoso, Bagus ; Oohama, Yasutada</creator><creatorcontrib>Santoso, Bagus ; Oohama, Yasutada</creatorcontrib><description>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</description><identifier>ISSN: 1556-6013</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2019.2907464</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>affine encoders ; Algorithms ; Coders ; Communication channels ; Correlation ; Decoding ; Distributed encryption ; Encryption ; Lower bounds ; Reliability ; secrecy amplification ; Slepian-Wolf network ; Solution strengthening</subject><ispartof>IEEE transactions on information forensics and security, 2019-11, Vol.14 (11), p.3042-3056</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</citedby><cites>FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</cites><orcidid>0000-0003-4604-305X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8673888$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54736</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8673888$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Santoso, Bagus</creatorcontrib><creatorcontrib>Oohama, Yasutada</creatorcontrib><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</description><subject>affine encoders</subject><subject>Algorithms</subject><subject>Coders</subject><subject>Communication channels</subject><subject>Correlation</subject><subject>Decoding</subject><subject>Distributed encryption</subject><subject>Encryption</subject><subject>Lower bounds</subject><subject>Reliability</subject><subject>secrecy amplification</subject><subject>Slepian-Wolf network</subject><subject>Solution strengthening</subject><issn>1556-6013</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kFFLwzAUhYMoOKc_QHwJ-NyZpE2aPI666XCgsA0fQ5ommrE2Neke-u9t2djTPVzOOffyAfCI0QxjJF62q-VmRhAWMyJQnrHsCkwwpSxhiODri8bpLbiLcY9QlmHGJ6DeGB2M7uG8bg_OOq065xvoLXx1sQuuPHamgotGh74d1cYfgzYRfrvuFxY-BHNQ4_7D9BHuomt-4JePXXJODF1J4es2mBgHfQ9urDpE83CeU7BbLrbFe7L-fFsV83WiiUi7hClEcqppVeEMYVVhkhMmMpQqU5JSaMsrK3KB1DCxZpRaw3HJK06QrYzl6RQ8n3rb4P-OJnZyP_zdDCclITTNGOYUDS58cungYwzGyja4WoVeYiRHqnKkKkeq8kx1yDydMs4Yc_Fzlqec8_Qf3rB1ZQ</recordid><startdate>20191101</startdate><enddate>20191101</enddate><creator>Santoso, Bagus</creator><creator>Oohama, Yasutada</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-4604-305X</orcidid></search><sort><creationdate>20191101</creationdate><title>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</title><author>Santoso, Bagus ; Oohama, Yasutada</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-6a0275c5dd1401ad127269403aeb2b9cf8df9790a8df1c655fe81b8d820fdef83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>affine encoders</topic><topic>Algorithms</topic><topic>Coders</topic><topic>Communication channels</topic><topic>Correlation</topic><topic>Decoding</topic><topic>Distributed encryption</topic><topic>Encryption</topic><topic>Lower bounds</topic><topic>Reliability</topic><topic>secrecy amplification</topic><topic>Slepian-Wolf network</topic><topic>Solution strengthening</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Santoso, Bagus</creatorcontrib><creatorcontrib>Oohama, Yasutada</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Santoso, Bagus</au><au>Oohama, Yasutada</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2019-11-01</date><risdate>2019</risdate><volume>14</volume><issue>11</issue><spage>3042</spage><epage>3056</epage><pages>3042-3056</pages><issn>1556-6013</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2019.2907464</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0003-4604-305X</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2019-11, Vol.14 (11), p.3042-3056 |
issn | 1556-6013 1556-6021 |
language | eng |
recordid | cdi_proquest_journals_2253461850 |
source | IEEE Electronic Library (IEL) |
subjects | affine encoders Algorithms Coders Communication channels Correlation Decoding Distributed encryption Encryption Lower bounds Reliability secrecy amplification Slepian-Wolf network Solution strengthening |
title | Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T16%3A10%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secrecy%20Amplification%20of%20Distributed%20Encrypted%20Sources%20With%20Correlated%20Keys%20Using%20Post-Encryption-Compression&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Santoso,%20Bagus&rft.date=2019-11-01&rft.volume=14&rft.issue=11&rft.spage=3042&rft.epage=3056&rft.pages=3042-3056&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2019.2907464&rft_dat=%3Cproquest_RIE%3E2253461850%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2253461850&rft_id=info:pmid/&rft_ieee_id=8673888&rfr_iscdi=true |