Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression

In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC) paradigm provides a suitable solution for the problem without requiring any additional secret randomness. More precisely, we show that in the case of one-time-pad encryption, we can use affine encoders with specific properties to strengthen the secrecy by using them to compress the ciphertexts before sending them to public communication channels. We show how to derive those affine encoders using universal code construction paradigm. The universal code construction gives us advantages as follows. 1) We can construct good encoders based on the transmission rates only, without knowing the value of the distribution of sources or keys. 2) Reliability and secrecy are achievable by construction even in particular cases such as follows: 1) only the range of correlation between keys is known but the exact amount is unknown or 2) the correlation between keys are changing time to time within a certain range. We also derive explicit lower bounds on the achievable reliability and secrecy exponents, i.e., the exponential rates of decay of the probability of decoding error and of the information leakage as the block length becomes large.

[1]  Renato Renner,et al.  Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement , 2007, ICITS.

[2]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[3]  W. Marsden I and J , 2012 .

[4]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[5]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[6]  Jun Muramatsu,et al.  On the problem of generating mutually independent random sequences , 2002, Proceedings IEEE International Symposium on Information Theory,.

[7]  Hugo Krawczyk,et al.  On Compression of Data Encrypted With Block Ciphers , 2012, IEEE Transactions on Information Theory.

[8]  Moritz Wiese,et al.  Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages , 2013, IEEE Transactions on Information Forensics and Security.

[9]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.

[10]  Yasutada Oohama On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information , 2018, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  Imre Csiszár Linear codes for sources and source networks: Error exponents, universal coding , 1982, IEEE Trans. Inf. Theory.

[12]  Yasutada Oohama Intrinsic Randomness Problem in the Framework of Slepian-Wolf Separate Coding System , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Te Sun Han,et al.  Universal coding for the Slepian-Wolf data compression system and the strong converse theorem , 1994, IEEE Trans. Inf. Theory.

[14]  Bagus Santoso,et al.  Privacy amplification of distributed encrypted sources with correlated keys , 2017, 2017 IEEE International Symposium on Information Theory (ISIT).

[15]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[16]  János Körner,et al.  How to encode the modulo-two sum of binary sources (Corresp.) , 1979, IEEE Trans. Inf. Theory.

[17]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .