Side-Channel Attacks to Broadcasting of Encrypted Sources Using Correlated Keys
We consider the secure communication problem for broadcasting of two encrypted sources using correlated keys. The sender wishes to broadcast two secret messages via two common key cryptosystems. We assume that two common keys used in the above two crypto systems have correlation. We further assume that the adversary can use side channels, where the side information on common keys can be obtained via rate constraint noiseless channel. To solve this problem we formulate the post encryption coding system. On the information leakage on two secrete messages to the adversary, we provide two explicit sufficient conditions to attain the exponential decay of this quantity for large block length of coding.
READ FULL TEXT