7 research outputs found
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks
We consider the secure communication problem for broadcasting of two
encrypted sources. The sender wishes to broadcast two secret messages via two
common key cryptosystems. We assume that the adversary can use the
side-channel, where the side information on common keys can be obtained via the
rate constraint noiseless channel. To solve this problem we formulate the post
encryption coding system. On the information leakage on two secrete messages to
the adversary, we provide an explicit sufficient condition to attain the
exponential decay of this quantity for large block lengths of encrypted
sources.Comment: 13 pages, 4 figures. In the current version we we have corrected
errors in Fig. 2 and Fig. 4. arXiv admin note: substantial text overlap with
arXiv:1801.02563, arXiv:1801.0492
Distributed Source Coding with Encryption Using Correlated Keys
We pose and investigate the distributed secure source coding based on the
common key cryptosystem. This cryptosystem includes the secrecy amplification
problem for distributed encrypted sources with correlated keys using
post-encryption-compression, which was posed investigated by Santoso and
Oohama. In this paper we propose another new security criterion which is
generally more strict compared to the commonly used security criterion which is
based on the upper-bound of mutual information between the plaintext and the
ciphertext. Under this criterion, we establish the necessary and sufficient
condition for the secure transmission of correlated sources.Comment: 7 pages, 3 figure. The short version was submitted to ISIT 2021. We
have some typos in the short version. Those are fixed in this version. arXiv
admin note: text overlap with arXiv:1801.0492
Recent Application in Biometrics
In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers
Social work with airports passengers
Social work at the airport is in to offer to passengers social services. The main
methodological position is that people are under stress, which characterized by a
particular set of characteristics in appearance and behavior. In such circumstances
passenger attracts in his actions some attention. Only person whom he trusts can help him
with the documents or psychologically
Safety and Reliability - Safe Societies in a Changing World
The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management
- mathematical methods in reliability and safety
- risk assessment
- risk management
- system reliability
- uncertainty analysis
- digitalization and big data
- prognostics and system health management
- occupational safety
- accident and incident modeling
- maintenance modeling and applications
- simulation for safety and reliability analysis
- dynamic risk and barrier management
- organizational factors and safety culture
- human factors and human reliability
- resilience engineering
- structural reliability
- natural hazards
- security
- economic analysis in risk managemen