Abstract :
We consider the Shannon cipher system in a setting where the secret key is delivered to the legitimate receiver via a channel with limited capacity. For this setting, we characterize the achievable region in the space of three figures of merit: the security (measured in terms of the equivocation), the compressibility of the cryptogram, and the distortion associated with the reconstruction of the plaintext source. Although lossy reconstruction of the plaintext does not rule out the option that the (noisy) decryption key would differ, to a certain extent, from the encryption key, we show, nevertheless, that the best strategy is to strive for perfect match between the two keys, by applying reliable channel coding to the key bits, and to control the distortion solely via rate-distortion coding of the plaintext source before the encryption. In this sense, our result has a flavor similar to that of the classical source-channel separation theorem. Some variations and extensions of this model are discussed as well
Keywords :
combined source-channel coding; cryptography; rate distortion theory; signal reconstruction; source separation; Shannon cipher system; channel coding; cryptogram compression; decryption-encryption key; plaintext source reconstruction; rate-distortion theory; receiver legitimation; secret key-distribution channel; source-channel separation theorem; Capacity planning; Channel capacity; Channel coding; Cities and towns; Cryptography; Distortion measurement; Rate-distortion; Reservoirs; Security; Transmitters; Cryptography; Shannon cipher system; encryption; key distribution; source–channel separation;