{"title":"Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks","authors":"Bagus Santoso, Y. Oohama","doi":"10.1109/ISIT.2019.8849849","DOIUrl":null,"url":null,"abstract":"We consider the secure communication problem of broadcasting of two encrypted sources against an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel but is also allowed to obtain the side information on the secret keys via the side-channel. In this paper, we propose a theoretical framework to solve this problem and also propose a countermeasure based on the post-encryption-compression paradigm. We provide an explicit sufficient condition to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"46 1","pages":"305-309"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2019.8849849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We consider the secure communication problem of broadcasting of two encrypted sources against an adversary which launches side-channel attacks. The adversary is not only allowed to eavesdrop the ciphertexts in the public communication channel but is also allowed to obtain the side information on the secret keys via the side-channel. In this paper, we propose a theoretical framework to solve this problem and also propose a countermeasure based on the post-encryption-compression paradigm. We provide an explicit sufficient condition to attain the exponential decay of the information leakage as the block lengths of encrypted sources become large.