Articles with "post encryption" as a keyword



Photo by goian from unsplash

Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2907464

Abstract: In this paper, we are interested in the problem of strengthening the secrecy of distributed encryption in a particular case where the encryption keys are correlated to each other. We show that the post-encryption-compression (PEC)… read more here.

Keywords: secrecy; encryption compression; post encryption; encryption ... See more keywords