A Framework of Distributed Source Encryption using Mutual Information Security Criterion and the Strong Converse Theorem

📅 2025-07-17
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper addresses the nonstandard security criterion in the Oohama–Santoso universal key cryptosystem for distributed secure source coding. For the first time within this framework, standard mutual information—rather than the original nonstandard measure—is adopted as the security metric, enabling a rigorous characterization of the achievable rate region for reliable and secure transmission. By integrating the information-spectrum method with a variant of the Birkhoff–von Neumann theorem, the authors derive a strong converse theorem under the standard mutual information constraint, thereby establishing tight upper and lower bounds on the rate region. The main contributions are: (1) the systematic introduction of standard information-theoretic security criteria into distributed encrypted source coding; (2) the first strong converse result based on standard mutual information; and (3) a significant enhancement in the theoretical rigor and comparability of security analysis.

Technology Category

Application Category

📝 Abstract
We reinvestigate the general distributed secure source coding based on the common key cryptosystem proposed by Oohama and Santoso (ITW 2021). They proposed a framework of distributed source encryption and derived the necessary and sufficient conditions to have reliable and secure transmission. However, the bounds of the rate region, which specifies both necessary and sufficient conditions to have reliable and secure transmission under the proposed cryptosystem, were derived based on a self-tailored non-standard} security criterion. In this paper we adopt the standard security criterion, i.e., standard mutual information. We successfully establish the bounds of the rate region based on this security criterion. Information spectrum method and a variant of Birkhoff-von Neumann theorem play an important role in deriving the result.
Problem

Research questions and friction points this paper is trying to address.

Investigates distributed secure source coding framework
Adopts standard mutual information security criterion
Establishes rate region bounds using information spectrum method
Innovation

Methods, ideas, or system contributions that make the work stand out.

Distributed source encryption framework
Standard mutual information security criterion
Information spectrum method application
🔎 Similar Papers
No similar papers found.