学位论文详细信息
Information-theoretic security under computational, bandwidth, and randomization constraints
Information-theoretic security;Information-theory;Coding theory;Polar codes
Chou, Remi ; Bloch, Matthieu Fekri, Faramarz Electrical and Computer Engineering Barry, John McLaughlin, Steven Tetali, Prasad ; Bloch, Matthieu
University:Georgia Institute of Technology
Department:Electrical and Computer Engineering
关键词: Information-theoretic security;    Information-theory;    Coding theory;    Polar codes;   
Others  :  https://smartech.gatech.edu/bitstream/1853/53837/1/CHOU-DISSERTATION-2015.pdf
美国|英语
来源: SMARTech Repository
PDF
【 摘 要 】

The objective of the proposed research is to develop and analyze coding schemes for information-theoretic security, which could bridge a gap between theory an practice. We focus on two fundamental models for information-theoretic security: secret-key generation for a source model and secure communication over the wire-tap channel. Many results for these models only provide existence of codes, and few attempts have been made to design practical schemes. The schemes we would like to propose should account for practical constraints. Specifically, we formulate the following constraints to avoid oversimplifying the problems. We should assume: (1) computationally bounded legitimate users and not solely rely on proofs showing existence of code with exponential complexity in the block-length; (2) a rate-limited public communication channel for the secret-key generation model, to account for bandwidth constraints; (3) a non-uniform and rate-limited source of randomness at the encoder for the wire-tap channel model, since a perfectly uniform and rate-unlimited source of randomness might be an expensive resource. Our work focuses on developingschemes for secret-key generation and the wire-tap channel that satisfy subsets of the aforementioned constraints.

【 预 览 】
附件列表
Files Size Format View
Information-theoretic security under computational, bandwidth, and randomization constraints 1886KB PDF download
  文献评价指标  
  下载次数:7次 浏览次数:9次