Compressing Encrypted Data: A Permutation Approach

被引:0
|
作者
Kang, Wei [1 ]
Liu, Nan [2 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a system where it is necessary to perform both encryption and lossy compression, the conventional way is to compress first and then encrypt the compressed data. Furthermore, this separation proves to be optimal. In certain applications where sensitive information should be protected as early as possible, it is preferable to perform encryption first and then compress the encrypted data. We call this the reversed system. Johnson et al. proposed an achievability scheme for the reversed system that utilizes modulo-sum encryption followed by compression using Wyner-Ziv distributed source coding with side information. However, the scheme requires more compression rate and secrecy key rate than the conventional system that first compresses and then encrypts. In this paper, we propose a new achievability scheme for the reversed system where encryption is done using a permutation cipher and then the encrypted data is compressed using the optimal rate-distortion code. The proposed scheme can achieve the optimal compression rate and secret key rate, and therefore shows that reversing the order of encryption and compression does not lead to performance loss of an encryption-compression system.
引用
收藏
页码:1382 / 1386
页数:5
相关论文
共 50 条
  • [41] Compressing Phasor Measurement Data
    Top, Philip
    Breneman, John
    2013 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING (PES), 2013,
  • [42] Compressing Data on Graphs with Clusters
    Asadi, Amir R.
    Abbe, Emmanuel
    Verdu, Sergio
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1583 - 1587
  • [43] A blockchain-based audit approach for encrypted data in federated learning
    Sun, Zhe
    Wan, Junping
    Yin, Lihua
    Cao, Zhiqiang
    Luo, Tianjie
    Wang, Bin
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 614 - 624
  • [44] A Hierarchical Tensor-Based Approach to Compressing, Updating and Querying Geospatial Data
    Yuan, Linwang
    Yu, Zhaoyuan
    Luo, Wen
    Hu, Yong
    Feng, Linyao
    Zhu, A-Xing
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (02) : 312 - 325
  • [45] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1259 - 1261
  • [46] SUPERIMPOSING ENCRYPTED DATA
    YU, KW
    YU, TL
    COMMUNICATIONS OF THE ACM, 1991, 34 (02) : 48 - 54
  • [47] A blockchain-based audit approach for encrypted data in federated learning
    Zhe Sun
    Junping Wan
    Lihua Yin
    Zhiqiang Cao
    Tianjie Luo
    Bin Wang
    Digital Communications and Networks, 2022, 8 (05) : 614 - 624
  • [48] Querying Encrypted Data
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Ramamurthy, Ravi
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1262 - 1263
  • [49] Computing on Encrypted Data
    Smart, Nigel
    IEEE SECURITY & PRIVACY, 2023, 21 (04) : 94 - 98
  • [50] Computing on Encrypted Data
    Gentry, Craig
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 477 - 477