Computer Science – Information Theory
Scientific paper
2005-05-05
Computer Science
Information Theory
15 pages, 1 figure
Scientific paper
We consider the Shannon cipher system in a setting where the secret key is delivered to the legitimate receiver via a channel with limited capacity. For this setting, we characterize the achievable region in the space of three figures of merit: the security (measured in terms of the equivocation), the compressibility of the cryptogram, and the distortion associated with the reconstruction of the plaintext source. Although lossy reconstruction of the plaintext does not rule out the option that the (noisy) decryption key would differ, to a certain extent, from the encryption key, we show, nevertheless, that the best strategy is to strive for perfect match between the two keys, by applying reliable channel coding to the key bits, and to control the distortion solely via rate-distortion coding of the plaintext source before the encryption. In this sense, our result has a flavor similar to that of the classical source-channel separation theorem. Some variations and extensions of this model are discussed as well.
No associations
LandOfFree
On the Shannon cipher system with a capacity-limited key-distribution channel does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with On the Shannon cipher system with a capacity-limited key-distribution channel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and On the Shannon cipher system with a capacity-limited key-distribution channel will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-114011