{"title":"Design of an error-free perfect secrecy system for unknown inputs","authors":"Chinthani Uduwerelle, Siu-Wai Ho, T. Chan","doi":"10.1109/AusCTW.2012.6164914","DOIUrl":null,"url":null,"abstract":"This paper studies the behaviour of a crypto-system in a situation where an encoder PX'R'|U' is used to encrypt a source U which may be different from the source U' considered to design the encoder. The original crypto-system is designed to achieve perfect secrecy under PU'. The resulting system also achieves perfect secrecy regardless of the source distribution. Finally the mismatch in the system resources are calculated when the actual source distribution is known. The number of channel uses remains unchanged at the value for which the system is designed. Upper and lower bounds for the expected key consumption are derived.","PeriodicalId":320391,"journal":{"name":"2012 Australian Communications Theory Workshop (AusCTW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Australian Communications Theory Workshop (AusCTW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AusCTW.2012.6164914","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper studies the behaviour of a crypto-system in a situation where an encoder PX'R'|U' is used to encrypt a source U which may be different from the source U' considered to design the encoder. The original crypto-system is designed to achieve perfect secrecy under PU'. The resulting system also achieves perfect secrecy regardless of the source distribution. Finally the mismatch in the system resources are calculated when the actual source distribution is known. The number of channel uses remains unchanged at the value for which the system is designed. Upper and lower bounds for the expected key consumption are derived.
本文研究了在使用编码器PX' r '|U'对源U进行加密的情况下密码系统的行为,而源U可能与设计编码器时考虑的源U'不同。原始密码系统的设计是为了在PU'下实现完美的保密性。由此产生的系统还可以实现完全的保密性,而不管源代码的分布如何。最后,在实际资源分布已知的情况下,计算系统资源的不匹配。通道使用的数量保持在系统设计的值不变。导出了预期键消耗的上限和下限。