A Secure Information Transmission Scheme With a Secret Key Based on Polar Coding

2014 ◽  
Vol 18 (6) ◽  
pp. 937-940 ◽  
Author(s):  
Young-Sik Kim ◽  
Jong-Hwan Kim ◽  
Sang-Hyo Kim
2013 ◽  
Vol 846-847 ◽  
pp. 1644-1647
Author(s):  
Xiao Le Li ◽  
Ying Wen ◽  
Ming Weng

Based on comprehensive analysis on security requirements of information transmission, security primitive is generated by automatic tool in asymmetric key cryptosystem, and improved with addition of compositional factors. And then, formal processes of secure information transmission are constructed with composition method. Formal analysis shows that, secrecy, integrity, availability, controllability, non-repudiation and identifiability during information transmission can be insured by this architecture, as a common framework for development of various application systems in digital campus from the viewpoint of information security.


Author(s):  
Pierre-Emmanuel Leni ◽  
Yohan D. Fougerolle ◽  
Frédéric Truchetet

In 1900, Hilbert declared that high order polynomial equations could not be solved by sums and compositions of continuous functions of less than three variables. This statement was proven wrong by the superposition theorem, demonstrated by Arnol’d and Kolmogorov in 1957, which allows for writing all multivariate functions as sums and compositions of univariate functions. Amongst recent computable forms of the theorem, Igelnik and Parikh’s approach, known as the Kolmogorov Spline Network (KSN), offers several alternatives for the univariate functions as well as their construction. A novel approach is presented for the embedding of authentication data (black and white logo, translucent or opaque image) in images. This approach offers similar functionalities than watermarking approaches, but relies on a totally different theory: the mark is not embedded in the 2D image space, but it is rather applied to an equivalent univariate representation of the transformed image. Using the progressive transmission scheme previously proposed (Leni, 2011), the pixels are re-arranged without any neighborhood consideration. Taking advantage of this naturally encrypted representation, it is proposed to embed the watermark in these univariate functions. The watermarked image can be accessed at any intermediate resolution, and fully recovered (by removing the embedded mark) without loss using a secret key. Moreover, the key can be different for every resolution, and both the watermark and the image can be globally restored in case of data losses during the transmission. These contributions lie in proposing a robust embedding of authentication data (represented by a watermark) into an image using the 1D space of univariate functions based on the Kolmogorov superposition theorem. Lastly, using a key, the watermark can be removed to restore the original image.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Liuguo Yin ◽  
Wentao Hao

Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC) codes and automatic repeat-request (ARQ) mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve), the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER) of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.


2019 ◽  
Vol 49 (4) ◽  
pp. 486-502
Author(s):  
Shengjun ZHANG ◽  
Liang JIN ◽  
Yu HUANG ◽  
Shilei ZHU ◽  
Kaizhi HUANG ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document