Security of compressing encrypted sources

被引:0
|
作者
Jakimoski, G. [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress cryptosystems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
引用
收藏
页码:901 / 903
页数:3
相关论文
共 50 条
  • [1] Compressing encrypted sources using side-information coding
    Ishwar, P
    Prabhakaran, V
    Ramchandran, K
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 210 - 210
  • [2] On compressing encrypted data
    Johnson, M
    Ishwar, P
    Prabhakaran, V
    Schonberg, D
    Ramchandran, K
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2004, 52 (10) : 2992 - 3006
  • [3] Compressing Encrypted Images With Auxiliary Information
    Zhang, Xinpeng
    Ren, Yanli
    Shen, Liquan
    Qian, Zhenxing
    Feng, Guorui
    IEEE TRANSACTIONS ON MULTIMEDIA, 2014, 16 (05) : 1327 - 1336
  • [4] Compressing Encrypted Data: A Permutation Approach
    Kang, Wei
    Liu, Nan
    2012 50TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2012, : 1382 - 1386
  • [5] On compressing encrypted data without the encryption key
    Johnson, M
    Wagner, D
    Ramchandran, K
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2004, 2951 : 491 - 504
  • [6] Compressing Encrypted Images Using the Integer Lifting Wavelet
    Wang, Chuntao
    Ni, Jiangqun
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 409 - 412
  • [7] A security analysis for encrypted database
    Mingsheng, Zhang
    Chunyong, Yin
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 987 - 990
  • [8] Compressing Encrypted Data: Achieving Optimality and Strong Secrecy via Permutations
    Kang, Wei
    Liu, Nan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (12) : 7153 - 7163
  • [9] On the Security of Encrypted Secret Sharing
    Braun, Johannes
    Wiesmaier, Alexander
    Buchmann, Johannes
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4966 - 4975
  • [10] Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks
    Santoso, Bagus
    Oohama, Yasutada
    ENTROPY, 2019, 21 (08)