Score: 0

A Framework of Distributed Source Encryption using Mutual Information Security Criterion and the Strong Converse Theorem

Published: July 17, 2025 | arXiv ID: 2507.13294v2

By: Yasutada Oohama, Bagus Santoso

Potential Business Impact:

Makes secret messages travel safely and reliably.

Business Areas:
E-Signature Information Technology, Privacy and Security

We reinvestigate the general distributed secure source coding based on the common key cryptosystem proposed by Oohama and Santoso (ITW 2021). They proposed a framework of distributed source encryption and derived the necessary and sufficient conditions to have reliable and secure transmission. However, the bounds of the rate region, which specifies both necessary and sufficient conditions to have reliable and secure transmission under the proposed cryptosystem, were derived based on a self-tailored non-standard} security criterion. In this paper we adopt the standard security criterion, i.e., standard mutual information. We successfully establish the bounds of the rate region based on this security criterion. Information spectrum method and a variant of Birkhoff-von Neumann theorem play an important role in deriving the result.

Country of Origin
🇯🇵 Japan

Page Count
11 pages

Category
Computer Science:
Information Theory