Lattice Codes for Secure Communication and Secret Key Generation
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
2018
|
Subjects: | |
Online Access: | http://etd.iisc.ernet.in/2005/3584 http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf |
id |
ndltd-IISc-oai-etd.iisc.ernet.in-2005-3584 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-IISc-oai-etd.iisc.ernet.in-2005-35842018-05-23T03:40:31ZLattice Codes for Secure Communication and Secret Key GenerationVatedka, ShashankSecret Key GenerationSecure CommunicationNested Lattice CodesInformation Theoretic SecuritySecure Bidirectional RelayingLDA LatticesSecure ComputationBidirectional RelayLattice Coding SchemeGaussian Markov Tree SourcesElectrical Communication EngineeringIn this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is assigned. Our objective is to design a scheme where the user nodes can reliably exchange messages such that the relay gets no information about the individual messages. We first describe a perfectly secure scheme using nested lattices, and show that our scheme achieves secrecy regardless of the distribution of the additive noise, and even if this distribution is unknown to the user nodes. Our scheme is explicit, in the sense that for any pair of nested lattices, we give the distribution used for randomization at the encoders to guarantee security. We then give a strongly secure lattice coding scheme, and we characterize the performance of both these schemes in the presence of Gaussian noise. We then extend our perfectly-secure and strongly-secure schemes to obtain a protocol that guarantees end-to-end secrecy in a multichip line network. We also briefly study the robustness of our bidirectional relaying schemes to channel imperfections. In the second problem, we consider the scenario where multiple terminals have access to private correlated Gaussian sources and a public noiseless communication channel. The objective is to generate a group secret key using their sources and public communication in a way that an eavesdropper having access to the public communication can obtain no information about the key. We give a nested lattice-based protocol for generating strongly secure secret keys from independent and identically distributed copies of the correlated random variables. Under certain assumptions on the joint distribution of the sources, we derive achievable secret key rates. The tools used in designing protocols for both these problems are nested lattice codes, which have been widely used in several problems of communication and security. In this thesis, we also study lattice constructions that permit polynomial-time encoding and decoding. In this regard, we first look at a class of lattices obtained from low-density parity-check (LDPC) codes, called Low-density Construction-A (LDA) lattices. We show that high-dimensional LDA lattices have several “goodness” properties that are desirable in many problems of communication and security. We also present a new class of low-complexity lattice coding schemes that achieve the capacity of the AWGN channel. Codes in this class are obtained by concatenating an inner Construction-A lattice code with an outer Reed-Solomon code or an expander code. We show that this class of codes can achieve the capacity of the AWGN channel with polynomial encoding and decoding complexities. Furthermore, the probability of error decays exponentially in the block length for a fixed transmission rate R that is strictly less than the capacity. To the best of our knowledge, this is the first capacity-achieving coding scheme for the AWGN channel which has an exponentially decaying probability of error and polynomial encoding/decoding complexities.Kashyap, Navin2018-05-22T15:33:54Z2018-05-22T15:33:54Z2018-05-222017Thesishttp://etd.iisc.ernet.in/2005/3584http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdfen_USG28181 |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
topic |
Secret Key Generation Secure Communication Nested Lattice Codes Information Theoretic Security Secure Bidirectional Relaying LDA Lattices Secure Computation Bidirectional Relay Lattice Coding Scheme Gaussian Markov Tree Sources Electrical Communication Engineering |
spellingShingle |
Secret Key Generation Secure Communication Nested Lattice Codes Information Theoretic Security Secure Bidirectional Relaying LDA Lattices Secure Computation Bidirectional Relay Lattice Coding Scheme Gaussian Markov Tree Sources Electrical Communication Engineering Vatedka, Shashank Lattice Codes for Secure Communication and Secret Key Generation |
description |
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is assigned. Our objective is to design a scheme where the user nodes can reliably exchange messages such that the relay gets no information about the individual messages. We first describe a perfectly secure scheme using nested lattices, and show that our scheme achieves secrecy regardless of the distribution of the additive noise, and even if this distribution is unknown to the user nodes. Our scheme is explicit, in the sense that for any pair of nested lattices, we give the distribution used for randomization at the encoders to guarantee security. We then give a strongly secure lattice coding scheme, and we characterize the performance of both these schemes in the presence of Gaussian noise. We then extend our perfectly-secure and strongly-secure schemes to obtain a protocol that guarantees end-to-end secrecy in a multichip line network. We also briefly study the robustness of our bidirectional relaying schemes to channel imperfections.
In the second problem, we consider the scenario where multiple terminals have access to private correlated Gaussian sources and a public noiseless communication channel. The objective is to generate a group secret key using their sources and public communication in a way that an eavesdropper having access to the public communication can obtain no information about the key. We give a nested lattice-based protocol for generating strongly secure secret keys from independent and identically distributed copies of the correlated random variables. Under certain assumptions on the joint distribution of the sources, we derive achievable secret key rates.
The tools used in designing protocols for both these problems are nested lattice codes, which have been widely used in several problems of communication and security. In this thesis, we also study lattice constructions that permit polynomial-time encoding and decoding. In this regard, we first look at a class of lattices obtained from low-density parity-check (LDPC) codes, called Low-density Construction-A (LDA) lattices. We show that high-dimensional LDA lattices have several “goodness” properties that are desirable in many problems of communication and security. We also present a new class of low-complexity lattice coding schemes that achieve the capacity of the AWGN channel. Codes in this class are obtained by concatenating an inner Construction-A lattice code with an outer Reed-Solomon code or an expander code. We show that this class of codes can achieve the capacity of the AWGN channel with polynomial encoding and decoding complexities. Furthermore, the probability of error decays exponentially in the block length for a fixed transmission rate R that is strictly less than the capacity. To the best of our knowledge, this is the first capacity-achieving coding scheme for the AWGN channel which has an exponentially decaying probability of error and polynomial encoding/decoding complexities. |
author2 |
Kashyap, Navin |
author_facet |
Kashyap, Navin Vatedka, Shashank |
author |
Vatedka, Shashank |
author_sort |
Vatedka, Shashank |
title |
Lattice Codes for Secure Communication and Secret Key Generation |
title_short |
Lattice Codes for Secure Communication and Secret Key Generation |
title_full |
Lattice Codes for Secure Communication and Secret Key Generation |
title_fullStr |
Lattice Codes for Secure Communication and Secret Key Generation |
title_full_unstemmed |
Lattice Codes for Secure Communication and Secret Key Generation |
title_sort |
lattice codes for secure communication and secret key generation |
publishDate |
2018 |
url |
http://etd.iisc.ernet.in/2005/3584 http://etd.iisc.ernet.in/abstracts/4452/G28181-Abs.pdf |
work_keys_str_mv |
AT vatedkashashank latticecodesforsecurecommunicationandsecretkeygeneration |
_version_ |
1718641234353848320 |