Show simple item record

dc.contributor.advisorKashyap, Navin
dc.contributor.authorVatedka, Shashank
dc.date.accessioned2018-05-22T15:33:54Z
dc.date.accessioned2018-07-31T04:49:34Z
dc.date.available2018-05-22T15:33:54Z
dc.date.available2018-07-31T04:49:34Z
dc.date.issued2018-05-22
dc.date.submitted2017
dc.identifier.urihttps://etd.iisc.ac.in/handle/2005/3584
dc.identifier.abstracthttp://etd.iisc.ac.in/static/etd/abstracts/4452/G28181-Abs.pdfen_US
dc.description.abstractIn this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is assigned. Our objective is to design a scheme where the user nodes can reliably exchange messages such that the relay gets no information about the individual messages. We first describe a perfectly secure scheme using nested lattices, and show that our scheme achieves secrecy regardless of the distribution of the additive noise, and even if this distribution is unknown to the user nodes. Our scheme is explicit, in the sense that for any pair of nested lattices, we give the distribution used for randomization at the encoders to guarantee security. We then give a strongly secure lattice coding scheme, and we characterize the performance of both these schemes in the presence of Gaussian noise. We then extend our perfectly-secure and strongly-secure schemes to obtain a protocol that guarantees end-to-end secrecy in a multichip line network. We also briefly study the robustness of our bidirectional relaying schemes to channel imperfections. In the second problem, we consider the scenario where multiple terminals have access to private correlated Gaussian sources and a public noiseless communication channel. The objective is to generate a group secret key using their sources and public communication in a way that an eavesdropper having access to the public communication can obtain no information about the key. We give a nested lattice-based protocol for generating strongly secure secret keys from independent and identically distributed copies of the correlated random variables. Under certain assumptions on the joint distribution of the sources, we derive achievable secret key rates. The tools used in designing protocols for both these problems are nested lattice codes, which have been widely used in several problems of communication and security. In this thesis, we also study lattice constructions that permit polynomial-time encoding and decoding. In this regard, we first look at a class of lattices obtained from low-density parity-check (LDPC) codes, called Low-density Construction-A (LDA) lattices. We show that high-dimensional LDA lattices have several “goodness” properties that are desirable in many problems of communication and security. We also present a new class of low-complexity lattice coding schemes that achieve the capacity of the AWGN channel. Codes in this class are obtained by concatenating an inner Construction-A lattice code with an outer Reed-Solomon code or an expander code. We show that this class of codes can achieve the capacity of the AWGN channel with polynomial encoding and decoding complexities. Furthermore, the probability of error decays exponentially in the block length for a fixed transmission rate R that is strictly less than the capacity. To the best of our knowledge, this is the first capacity-achieving coding scheme for the AWGN channel which has an exponentially decaying probability of error and polynomial encoding/decoding complexities.en_US
dc.language.isoen_USen_US
dc.relation.ispartofseriesG28181en_US
dc.subjectSecret Key Generationen_US
dc.subjectSecure Communicationen_US
dc.subjectNested Lattice Codesen_US
dc.subjectInformation Theoretic Securityen_US
dc.subjectSecure Bidirectional Relayingen_US
dc.subjectLDA Latticesen_US
dc.subjectSecure Computationen_US
dc.subjectBidirectional Relayen_US
dc.subjectLattice Coding Schemeen_US
dc.subjectGaussian Markov Tree Sourcesen_US
dc.subject.classificationElectrical Communication Engineeringen_US
dc.titleLattice Codes for Secure Communication and Secret Key Generationen_US
dc.typeThesisen_US
dc.degree.namePhDen_US
dc.degree.levelDoctoralen_US
dc.degree.disciplineFaculty of Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record