Security of compressing encrypted sources

被引:0
|
作者
Jakimoski, G. [1 ]
Subbalakshmi, K. P. [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When transmitting redundant data over an insecure channel, it is customary to first compress the data and then encrypt it. Johnson et al have investigated a cryptosystem where the order of these steps is reversed, and they have shown that this reversal is possible. We formally study the security of the encrypt-then-compress cryptosystems and show that the compression does not compromise the security of the system in both the information theoretic case (perfectly secure encryption) and the complexity theoretic case (computationally secure encryption).
引用
收藏
页码:901 / 903
页数:3
相关论文
共 50 条
  • [31] Encrypted model predictive control design for security to cyberattacks
    Suryavanshi, Atharva
    Alnajdi, Aisha
    Alhajeri, Mohammed
    Abdullah, Fahim
    Christofides, Panagiotis D.
    AICHE JOURNAL, 2023, 69 (08)
  • [32] Information Security Through Encrypted Domain Data Hiding
    Kumar, Vikas
    Muchhal, Prateek
    Thanikasiselvan, V
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 370 - 379
  • [33] Privacy Amplification of Distributed Encrypted Sources with Correlated Keys
    Santoso, Bagus
    Oohama, Yasutada
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 958 - 962
  • [34] Probing Protein Sequences as Sources for Encrypted Antimicrobial Peptides
    Brand, Guilherme D.
    Magalhaes, Mariana T. Q.
    Tinoco, Maria L. P.
    Aragao, Francisco J. L.
    Nicoli, Jacques
    Kelly, Sharon M.
    Cooper, Alan
    Bloch, Carlos, Jr.
    PLOS ONE, 2012, 7 (09):
  • [35] Security of radioactive sources
    不详
    NUCLEAR ENERGY-JOURNAL OF THE BRITISH NUCLEAR ENERGY SOCIETY, 2003, 42 (03): : 126 - 126
  • [36] On the security of random sources
    Coron, JS
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 29 - 42
  • [37] Encrypted Computing Speed, Security and Provable Obfuscation against Insiders
    Breuer, Peter T.
    Bowen, Jonathan P.
    Palomar, Esther
    Liu, Zhiming
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [38] Amazon Echo Security: Machine Learning to Classify Encrypted Traffic
    Jackson, Ryan Blake
    Camp, Tracy
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [39] Security Authentication System using Encrypted Channel on UAV Network
    Yoon, Kwanwoong
    Park, Daejun
    Yim, Yujin
    Kim, Kyounghee
    Yang, Szu Kai
    Robinson, Myles
    2017 FIRST IEEE INTERNATIONAL CONFERENCE ON ROBOTIC COMPUTING (IRC), 2017, : 393 - 398
  • [40] Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
    Rueckert, Markus
    Schroeder, Dominique
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 17 - 34