Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys

01/17/2019
by   Bagus Santoso, et al.
0

We consider the secure communication problem for broadcasting of two encrypted sources using correlated keys. The sender wishes to broadcast two secret messages via two common key cryptosystems. We assume that two common keys used in the above two crypto systems have correlation. We further assume that the adversary can use side channels, where the side information on common keys can be obtained via rate constraint noiseless channel. To solve this problem we formulate the post encryption coding system. On the information leakage on two secrete messages to the adversary, we provide two explicit sufficient conditions to attain the exponential decay of this quantity for large block length of coding.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset