Compressed sensing, further to its ability of reducing resources spent in signal acquisition, may be seen as an implicit private-key encryption scheme. The level of achievable secrecy has been analyzed in the most classical settings, when the sensing matrix is made of independent and identically distributed entries. Yet, it is known that substantially improved acquisition can be achieved by tuning the statistics of such a matrix. The effect of such an optimization on the robustness with respect to classical cryptographic attacks is analyzed here.
Compressed sensing, further to its ability of reducing resources spent in signal acquisition, may be seen as an implicit private-key encryption scheme. The level of achievable secrecy has been analyzed in the most classical settings, when the sensing matrix is made of independent and identically distributed entries. Yet, it is known that substantially improved acquisition can be achieved by tuning the statistics of such a matrix. The effect of such an optimization on the robustness with respect to classical cryptographic attacks is analyzed here.
Security analysis of rakeness-based compressed sensing / Mangia, Mauro; Pareschi, Fabio; Rovatti, Riccardo; Setti, Gianluca. - ELETTRONICO. - (2016), pp. 241-244. (Intervento presentato al convegno 2016 IEEE International Symposium on Circuits and Systems, ISCAS 2016 tenutosi a Montreal, QC, Canada nel 22-25 May 2016) [10.1109/ISCAS.2016.7527215].
Security analysis of rakeness-based compressed sensing
Pareschi Fabio;Setti Gianluca
2016
Abstract
Compressed sensing, further to its ability of reducing resources spent in signal acquisition, may be seen as an implicit private-key encryption scheme. The level of achievable secrecy has been analyzed in the most classical settings, when the sensing matrix is made of independent and identically distributed entries. Yet, it is known that substantially improved acquisition can be achieved by tuning the statistics of such a matrix. The effect of such an optimization on the robustness with respect to classical cryptographic attacks is analyzed here.File | Dimensione | Formato | |
---|---|---|---|
Setti-Security.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
1.15 MB
Formato
Adobe PDF
|
1.15 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
ISCAS2016-security.pdf
accesso aperto
Descrizione: Author version
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
749.84 kB
Formato
Adobe PDF
|
749.84 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2696675