Security of compressing encrypted sources

被引:0
|
作者
Jakimoski, G. [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress cryptosystems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
引用
收藏
页码:901 / 903
页数:3
相关论文
共 50 条
  • [21] Encrypted sensing for enhancing security of biometric authentication
    Suzuki, Hiroyuki
    Takeda, Masafumi
    Obi, Takashi
    Yamaguchi, Masahiro
    Ohyama, Nagaaki
    Nakano, Kazuya
    2014 13TH WORKSHOP ON INFORMATION OPTICS (WIO), 2014,
  • [22] On the Security of Selectively Encrypted HEVC Video Bitstreams
    Chen, Chen
    Qu, Lingfeng
    Amirpour, Hadi
    Wang, Xingjun
    Timmerer, Christian
    Tian, Zhihong
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (09)
  • [23] Optimization of encrypted holograms in optical security systems
    Yamazaki, M
    Ohtsubo, J
    OPTICAL ENGINEERING, 2001, 40 (01) : 132 - 137
  • [24] Security enhancement for AES encrypted speech in communications
    Mossa E.
    International Journal of Speech Technology, 2017, 20 (01) : 163 - 169
  • [25] Joins over Encrypted Data with Fine Granular Security
    Hahn, Florian
    Loza, Nicolas
    Kerschbaum, Florian
    2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 674 - 685
  • [26] The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images
    Yang, Ying
    Xiang, Tao
    Lv, Xiao
    Guo, Shangwei
    Zeng, Tieyong
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (05) : 3998 - 4010
  • [27] Verifiably Encrypted Signatures: Security Revisited and a New Construction
    Hanser, Christian
    Rabkin, Max
    Schroeder, Dominique
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 146 - 164
  • [28] Security sensor providing analysis of encrypted network data
    Hamburg, Daniel
    Tuechelmann, York
    WEBIST 2006: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 172 - +
  • [29] Nothing is for Free: Security in Searching Shared and Encrypted Data
    Tang, Qiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1943 - 1952
  • [30] Enhancing Security of Encrypted Data Sharing on Social Networks
    Chutke, Prajakta D.
    Hadap, M. K.
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,