- 2
- 0
- 约4.26千字
- 约 16页
- 2017-03-09 发布于上海
- 举报
The Secrecy of Compressed Sensing Measurements压缩感知测量的保密性
Allerton Allerton Allerton Allerton Allerton Allerton Allerton Allerton The Secrecy of Compressed Sensing Measurements Yaron Rachlin Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAA Alice wants to send Bob secret message. Message is K-sparse. Alice uses CS projection matrix to encode message. Does matrix act as encryption key? If Bob knows CS matrix, can recover message. Compressed Sensing (CS) Secrecy Scenario * Compressed Sensing Attack Scenario Eve intercepts message, does not know matrix. Can Eve recover secret message? * Is compressed sensing secure? Claims: “The encryption matrix can be viewed as a one-time pad that is completely secure” I. Drori “Compressed Video Sensing” BMVA Symposium on 3D Video - Analysis, Display and Applications, 2008. “effectively implements a?weak?form of?encryption ” D. Baron, M. F. Duarte, S. Sarvotham, M. B. Wakin and R. G. Baraniuk “An Information-Theoretic Approach to Distributed Compressed Sensing” Allerton 2005. * Notions of security Information theoretic – H(message|ciphertext)=H(message) Computationally unbounded adversary Computational – Extracting message equivalent to solving computationally hard problem Computationally bounded adversary * Perfect Secrecy? Definition of perfect secrecy (Shannon). X message, Y ciphertext, I(X;Y)=0 Does CS-based encryption achieve perfect secrecy? NO Noiseless case: If message X=0, ciphertext Y=0. CS matrices satisfying RIP roughly preserve l2 norm. Mutual information is positive. Could mutual information be small? * Computational Secrecy Recovery is feasible, but hard for computationally bounded adversary. (Weaker) More widely used than perfect secrecy. How many matrices must an attacker try before finding the correct Phi matrix? Propose this as a computational notion of security for CS. * 264 keys could be an unfortunate predicament. Application Example: Biometrics Don’t want to store lots of data “in the
您可能关注的文档
- The Principle Goal Bradley University原则目标布拉德利大学.ppt
- The Principal Creative Leadership for Excellence in Schools学校的校长创新领导力.ppt
- The Principles of Design teacher web设计原则教师网络.ppt
- The PRISM Approach to Mapping Precipitation and Temperature棱镜的方法来映射降水和温度.ppt
- THE PROCESS OF SCIENCE shsu科学的过程shsu.ppt
- The processing of morphemelike units in monomorphemic words语素单位在monomorphemic处理..ppt
- The Procurement Cycle World Bank Group采购周期世界银行集团.ppt
- The Problem of Overcoming Sinful Habits克服罪恶习惯的问题.ppt
- THE PRODUCTION AND USE OF ICT IN FINLAND, 19752001生产和使用信息和通信技术在芬兰、19752001.ppt
- The Problem of Evil philosophicaladvisor恶的问题philosophicaladvisor.ppt
- 2025-2026学年天津市和平区高三(上)期末数学试卷(含解析).pdf
- 2025-2026学年云南省楚雄州高三(上)期末数学试卷(含答案).pdf
- 2025-2026学年甘肃省天水市张家川实验中学高三(上)期末数学试卷(含答案).docx
- 2025-2026学年福建省厦门市松柏中学高二(上)期末数学试卷(含答案).docx
- 2025-2026学年广西钦州市高一(上)期末物理试卷(含答案).docx
- 2025-2026学年河北省邯郸市临漳县九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省石家庄二十三中七年级(上)期末历史试卷(含答案).docx
- 2025-2026学年海南省五指山市九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省唐山市玉田县九年级(上)期末化学试卷(含答案).docx
- 2025-2026学年河北省邢台市市区九年级(上)期末化学试卷(含答案).docx
原创力文档

文档评论(0)