Skip to main content

The Encryption Scheme with Data Compression Based on QC-LDPC

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

  • 1423 Accesses

Abstract

Aiming at the security issue of big data, a new encryption scheme with data compression was designed, which is based on the coding theory. Combining with the theory of compression, a compressed encryption scheme based on quasi-cyclic low density parity check code was proposed. Furthermore, the performance and security of the scheme are analyzed, and through analysis it demonstrates the superiority of the scheme for big data encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tankard, C.: Big data security. Netw. Secur. 2012(7), 5–8 (2012)

    Article  Google Scholar 

  2. Koushikaa, M., Habipriya, S., Aravinth, S.S., et al.: A public key cryptography security system for big data. Int. J. Innovative Res. Sci. Technol. 1(6), 311–313 (2014)

    Google Scholar 

  3. Candès, E., Tao, T.: Near optimal signal recovery from random projections: Universal encoding strategies. IEEE Trans. Inf. Theory 52(12), 5402–5425 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  4. Wenze, S., Zhihui, W.: Advances and perspectives on compressed sensing theory. J. Image Graph. 17(1), 1–12 (2012)

    Google Scholar 

  5. McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Prog. Rep. 42(44), 114–116 (1978)

    Google Scholar 

  6. Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Probl. Contr. Informat. Theory 15, 159–166 (1986)

    MathSciNet  MATH  Google Scholar 

  7. Gaborit, P., Ruatta, O., Schrek, J., Zémor, G.: RankSign: an efficient signature algorithm based on the rank metric. In: Mosca, M. (ed.) PQCrypto 2014. LNCS, vol. 8772, pp. 88–107. Springer, Heidelberg (2014). doi:10.1007/978-3-319-11659-4_6

    Google Scholar 

  8. Baldi, M.: QC-LDPC Code-Based Cryptosystems, pp. 91–117. Springer, Heidelberg (2014)

    MATH  Google Scholar 

  9. Baldi, M., Bianchi, M., Chiaraluce, F.: Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes. IET Inf. Secur. 7(3), 212–220 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partially supported by National Natural Science Foundation of China (61572521, 61103231, 61272492), Project funded by China Postdoctoral Science Foundation (2014M562445, 2015T81047), and Natural Science Basic Research Plan in Shaanxi Province of China (2015JM6353).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Han, Y. (2016). The Encryption Scheme with Data Compression Based on QC-LDPC. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics