Skip to main content

Showing 1–50 of 50 results for author: Prabhakaran, V M

.
  1. arXiv:2405.05211  [pdf, ps, other

    cs.IT

    Broadcast Channel Synthesis from Shared Randomness

    Authors: Malhar A. Managoli, Vinod M. Prabhakaran

    Abstract: We study the problem of synthesising a two-user broadcast channel using a common message, where each output terminal shares an independent source of randomness with the input terminal. This generalises two problems studied in the literature (Cuff, IEEE Trans. Inform. Theory, 2013; Kurri et.al., IEEE Trans. Inform. Theory, 2021). We give an inner bound on the tradeoff region between the rates of co… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  2. arXiv:2405.02585  [pdf, ps, other

    cs.IT

    Maximal Guesswork Leakage

    Authors: Gowtham R. Kurri, Malhar Managoli, Vinod M. Prabhakaran

    Abstract: We introduce the study of information leakage through \emph{guesswork}, the minimum expected number of guesses required to guess a random variable. In particular, we define \emph{maximal guesswork leakage} as the multiplicative decrease, upon observing $Y$, of the guesswork of a randomized function of $X$, maximized over all such randomized functions. We also study a pointwise form of the leakage… ▽ More

    Submitted 4 May, 2024; originally announced May 2024.

    Comments: 6 pages. Extended version of a paper accepted to ISIT 2024

  3. arXiv:2309.11174  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part II: Communication With Adversary Identification

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.03380

  4. arXiv:2304.14934  [pdf, ps, other

    cs.IT cs.CR

    Randomness Requirements for Three-Secret Sharing

    Authors: Hari Krishnan P. Anilkumar, Aayush Rajesh, Varun Narayanan, Manoj M. Prabhakaran, Vinod M. Prabhakaran

    Abstract: We study a secret sharing problem with three secrets where the secrets are allowed to be related to each other, i.e., only certain combinations of the three secrets are permitted. The dealer produces three shares such that every pair of shares reveals a unique secret and reveals nothing about the other two secrets, other than what can be inferred from the revealed secret. For the case of binary se… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: Accepted in International Symposium on Information Theory 2023

  5. arXiv:2304.14166  [pdf, ps, other

    cs.IT

    Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents

    Authors: Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study the Chernoff-Stein exponent of the following binary hypothesis testing problem: Associated with each hypothesis is a set of channels. A transmitter, without knowledge of the hypothesis, chooses the vector of inputs to the channel. Given the hypothesis, from the set associated with the hypothesis, an adversary chooses channels, one for each element of the input vector. Based on the channel… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: This is a slightly edited version of the extended manuscript submitted to ISIT 2023 for review on February 5, 2023; the paper has been accepted for presentation

  6. arXiv:2211.12769  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part I: Reliable Communication

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. The receiver is unaware of the identity of the adversarial users (if any). When all users are non-adversarial, we want their messages to be decoded reliably. When a user behaves adversarially, we require that the honest users' messages be decoded reliably. An adversarial user can mount an attack by… ▽ More

    Submitted 11 September, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: This supercedes Part I of arxiv:1904.11925

  7. arXiv:2205.06073  [pdf, ps, other

    cs.IT cs.CR cs.DC

    Consensus Capacity of Noisy Broadcast Channels

    Authors: Neha Sangwan, Varun Narayanan, Vinod M. Prabhakaran

    Abstract: We study communication with consensus over a broadcast channel - the receivers reliably decode the sender's message when the sender is honest, and their decoder outputs agree even if the sender acts maliciously. We characterize the broadcast channels which permit this byzantine consensus and determine their capacity.

    Submitted 16 June, 2022; v1 submitted 12 May, 2022; originally announced May 2022.

  8. arXiv:2105.03420  [pdf, other

    cs.IT

    Compound Arbitrarily Varying Channels

    Authors: Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We propose a communication model, that we call compound arbitrarily varying channels (CAVC), which unifies and generalizes compound channels and arbitrarily varying channels (AVC). A CAVC can be viewed as a noisy channel with a fixed, but unknown, compound-state and an AVC-state which may vary with every channel use. The AVC-state is controlled by an adversary who is aware of the compound-state. W… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  9. arXiv:2105.03380  [pdf, ps, other

    cs.IT

    Communication With Adversary Identification in Byzantine Multiple Access Channels

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  10. Multiple Access Channel Simulation

    Authors: Gowtham R. Kurri, Viswanathan Ramachandran, Sibi Raj B. Pillai, Vinod M. Prabhakaran

    Abstract: We study the problem of simulating a two-user multiple-access channel (MAC) over a multiple access network of noiseless links. Two encoders observe independent and identically distributed (i.i.d.) copies of a source random variable each, while a decoder observes i.i.d. copies of a side-information random variable. There are rate-limited noiseless communication links between each encoder and the de… ▽ More

    Submitted 16 June, 2022; v1 submitted 23 February, 2021; originally announced February 2021.

    Comments: 30 pages, 3 figures

  11. arXiv:2006.00257  [pdf, other

    cs.IT

    Private Index Coding

    Authors: Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran

    Abstract: We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection of messages beyond its demanded messages from the server and what is available to it as side information. To enable such private communication, we allow the use of a collection of independent secret keys, each of which is shared amongst a su… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Comments: 46 pages, 10 figures

  12. arXiv:2005.05961  [pdf, other

    cs.IT

    Private Two-Terminal Hypothesis Testing

    Authors: Varun Narayanan, Manoj Mishra, Vinod M. Prabhakaran

    Abstract: We study private two-terminal hypothesis testing with simple hypotheses where the privacy goal is to ensure that participating in the testing protocol reveals little additional information about the other user's observation when a user is told what the correct hypothesis is. We show that, in general, meaningful correctness and privacy cannot be achieved if the users do not have access to correlate… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

    Comments: Extended version of a paper to be presented at the IEEE Intl. Symp. on Inform. Theory (ISIT) 2020

  13. arXiv:2005.05111  [pdf, other

    cs.IT

    Secure Computation to Hide Functions of Inputs

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran

    Abstract: We consider a two-user secure computation problem in which Alice and Bob communicate interactively in order to compute some deterministic functions of the inputs. The privacy requirement is that each user should not learn any additional information about a function of the inputs other than what can be inferred from its own input and output. For the distribution-free setting, i.e., when the protoco… ▽ More

    Submitted 11 May, 2020; originally announced May 2020.

    Comments: Extended version of a paper to appear at International Symposium on Information Theory (ISIT) 2020. 7 pages, 3 figures

  14. Coordination Through Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: We study a distributed sampling problem where a set of processors want to output (approximately) independent and identically distributed samples from a joint distribution with the help of a common message from a coordinator. Each processor has access to a subset of sources from a set of independent sources of "shared" randomness. We consider two cases -- in the "omniscient coordinator setting", th… ▽ More

    Submitted 17 June, 2021; v1 submitted 22 August, 2019; originally announced August 2019.

    Comments: 27 pages, 7 figures. Some results of this paper were presented at ISIT 2018 and ITW 2019. This paper subsumes arXiv:1805.03193

  15. arXiv:1904.11925  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over multiple access channels (MAC) where one of the users is possibly adversarial. When all users are non-adversarial, we want their messages to be decoded reliably. When an adversary is present, we consider two different decoding guarantees. In part I, we require that the honest users' messages be decoded reliably. We study the 3-user MAC; 2-user MAC capacity follows fro… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: Part II is an extended version of the paper titled "Multiple Access Channels with Adversarial Users" to be presented at IEEE International Symposium on Information Theory 2019

  16. arXiv:1904.03271  [pdf, ps, other

    cs.IT cs.DC math.CO

    Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation

    Authors: Yanjun Han, Kedar Tatwawadi, Gowtham R. Kurri, Zhengqing Zhou, Vinod M. Prabhakaran, Tsachy Weissman

    Abstract: We study common randomness generation problems where $n$ players aim to generate same sequences of random coin flips where some subsets of the players share an independent common coin which can be tossed multiple times, and there is a publicly seen blackboard through which the players communicate with each other. We provide a tight representation of the optimal communication rates via linear progr… ▽ More

    Submitted 6 October, 2021; v1 submitted 5 April, 2019; originally announced April 2019.

    Comments: 17 pages, 10 figures

  17. Interactive Secure Function Computation

    Authors: Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran

    Abstract: We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we… ▽ More

    Submitted 9 March, 2020; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: 30 pages. Revised based on comments from the reviewers

  18. arXiv:1811.09973  [pdf, other

    cs.IT

    Joint State Estimation and Communication over a State-Dependent Gaussian Multiple Access Channel

    Authors: Viswanathan Ramachandran, Sibi Raj B Pillai, Vinod M Prabhakaran

    Abstract: A hybrid communication network with a common analog signal and an independent digital data stream as input to each node in a multiple access network is considered. The receiver/base-station has to estimate the analog signal with a given fidelity, and decode the digital streams with a low error probability. Treating the analog signal as a common state process, we set up a joint state estimation and… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Comments: 12 pages, Journal submission

  19. arXiv:1809.04464  [pdf, other

    cs.IT

    Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a two-output noi… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1704.07693

  20. arXiv:1805.03193  [pdf, other

    cs.IT

    Coordination Using Individually Shared Randomness

    Authors: Gowtham R. Kurri, Vinod M. Prabhakaran, Anand D. Sarwate

    Abstract: Two processors output correlated sequences using the help of a coordinator with whom they individually share independent randomness. For the case of unlimited shared randomness, we characterize the rate of communication required from the coordinator to the processors over a broadcast link. We also give an achievable trade-off between the communication and shared randomness rates.

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: Extended version of a paper accepted for presentation at ISIT 2018. 8 pages, 3 figures

  21. arXiv:1705.07081  [pdf, other

    cs.IT

    Secure Computation of Randomized Functions: Further Results

    Authors: Deepesh Data, Vinod M. Prabhakaran

    Abstract: We consider secure computation of randomized functions between two users, where both the users (Alice and Bob) have inputs, Alice sends a message to Bob over a rate-limited, noise-free link, and then Bob produces the output. We study two cases: (i) when privacy condition is required only against Bob, who tries to learn more about Alice's input from the message than what can be inferred by his own… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: This is an extended version of a submission to ITW, 2017

  22. arXiv:1704.07693  [pdf, other

    cs.IT

    Coding for Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for a memoryless remote source. The source data is broadcast over an arbitrarily varying channel (AVC) controlled by an adversary. One output of the AVC is received as input at the encoder, and another output is received as side information at the decoder. The adversary is assumed to know the source data non-causally, and can employ randomized jamming strateg… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

    Comments: 11 pages

  23. arXiv:1604.05668  [pdf, ps, other

    cs.CR cs.IT

    Wiretapped Oblivious Transfer

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: In this paper, we study the problem of obtaining $1$-of-$2$ string oblivious transfer (OT) between users Alice and Bob, in the presence of a passive eavesdropper Eve. The resource enabling OT in our setup is a noisy broadcast channel from Alice to Bob and Eve. Apart from the OT requirements between the users, Eve is not allowed to learn anything about the users' inputs. When Alice and Bob are hone… ▽ More

    Submitted 20 April, 2016; v1 submitted 19 April, 2016; originally announced April 2016.

    Comments: Submitted to IEEE Transactions on Information Theory

  24. Communication and Randomness Lower Bounds for Secure Computation

    Authors: Deepesh Data, Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: In secure multiparty computation (MPC), mutually distrusting users collaborate to compute a function of their private data without revealing any additional information about their data to other users. While it is known that information theoretically secure MPC is possible among $n$ users (connected by secure and noiseless links and have access to private randomness) against the collusion of less t… ▽ More

    Submitted 10 May, 2016; v1 submitted 24 December, 2015; originally announced December 2015.

    Comments: 30 pages, To Appear in the IEEE Transaction of Information Theory. arXiv admin note: substantial text overlap with arXiv:1311.7584

  25. arXiv:1511.07949  [pdf, other

    cs.CC cs.IT

    Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound

    Authors: Manoj M. Prabhakaran, Vinod M. Prabhakaran

    Abstract: We introduce a new information-theoretic complexity measure $IC_\infty$ for 2-party functions which is a lower-bound on communication complexity, and has the two leading lower-bounds on communication complexity as its natural relaxations: (external) information complexity ($IC$) and logarithm of partition complexity ($\text{prt}$), which have so far appeared conceptually quite different from each… ▽ More

    Submitted 28 June, 2016; v1 submitted 25 November, 2015; originally announced November 2015.

    Comments: Full version of paper appearing at ICALP 2016

    ACM Class: F.1.3

  26. arXiv:1509.08299  [pdf, other

    cs.IT

    Communication in the Presence of a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication systems over state-dependent channels in the presence of a malicious state-aware jamming adversary. The channel has a memoryless state with an underlying distribution. The adversary introduces a jamming signal into the channel. The state sequence is known non-causally to both the encoder and the adversary. Taking an Arbitrarily Varying Channel (AVC) approach, we consider two… ▽ More

    Submitted 31 August, 2017; v1 submitted 28 September, 2015; originally announced September 2015.

    Comments: 24 pages, 3 figures

  27. On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve. In addition to the privacy goals of oblivious transfer between Alice and Bob, we require privacy of Alice and Bob's private data from Eve. In previous work we derived the OT capacity (in the honest-but-curious model) of the wiret… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.

    Comments: To be presented at the IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong

  28. arXiv:1504.04351  [pdf, other

    cs.IT

    Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, we take an arbitrarily varying channel (AVC) approach to examine the problem of writing on a dirty paper in the presence of an adversary. We consider an additive white Gaussian noise (AWGN) channel with an additive white Gaussian state, where the state is known non-causally to the encoder and the adversary, but not the decoder. We determine the randomized coding capacity of this AVC… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

  29. Private Data Transfer over a Broadcast Channel

    Authors: Manoj Mishra, Tanmay Sharma, Bikash K. Dey, Vinod M. Prabhakaran

    Abstract: We study the following private data transfer problem: Alice has a database of files. Bob and Cathy want to access a file each from this database (which may or may not be the same file), but each of them wants to ensure that their choices of file do not get revealed even if Alice colludes with the other user. Alice, on the other hand, wants to make sure that each of Bob and Cathy does not learn any… ▽ More

    Submitted 16 April, 2015; v1 submitted 5 April, 2015; originally announced April 2015.

    Comments: To be presented at IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong

  30. arXiv:1502.04806  [pdf, ps, other

    cs.IT

    On the Noisy Feedback Capacity of Gaussian Broadcast Channels

    Authors: Sibi Raj B. Pillai, Vinod M. Prabhakaran

    Abstract: It is well known that, in general, feedback may enlarge the capacity region of Gaussian broadcast channels. This has been demonstrated even when the feedback is noisy (or partial-but-perfect) and only from one of the receivers. The only case known where feedback has been shown not to enlarge the capacity region is when the channel is physically degraded (El Gamal 1978, 1981). In this paper, we sho… ▽ More

    Submitted 17 February, 2015; originally announced February 2015.

    Comments: 5 pages, 3 figures, to appear in IEEE Information Theory Workshop 2015, Jerusalem

  31. arXiv:1501.02549  [pdf, ps, other

    cs.IT

    Critical Database Size for Effective Caching

    Authors: Ajaykrishnan N., Navya S. Prem, Vinod M. Prabhakaran, Rahul Vaze

    Abstract: Replicating or caching popular content in memories distributed across the network is a technique to reduce peak network loads. Conventionally, the performance gain of caching was thought to result from making part of the requested data available closer to end users. Recently, it has been shown that by using a carefully designed technique to store the contents in the cache and coding across data st… ▽ More

    Submitted 12 January, 2015; originally announced January 2015.

  32. arXiv:1408.6285  [pdf, other

    cs.CC cs.IT

    Tension Bounds for Information Complexity

    Authors: Manoj M. Prabhakaran, Vinod M. Prabhakaran

    Abstract: The main contribution of this work is to relate information complexity to "tension" [Prabhakaran and Prabhakaran, 2014] - an information-theoretic quantity defined with no reference to protocols - and to illustrate that it allows deriving strong lower-bounds on information complexity. In particular, we use a very special case of this connection to give a quantitatively tighter connection between i… ▽ More

    Submitted 26 August, 2014; originally announced August 2014.

  33. arXiv:1408.1800  [pdf, ps, other

    cs.IT

    Secret Communication over Broadcast Erasure Channels with State-feedback

    Authors: László Czap, Vinod M. Prabhakaran, Christina Fragouli, Suhas Diggavi

    Abstract: We consider a 1-to-$K$ communication scenario, where a source transmits private messages to $K$ receivers through a broadcast erasure channel, and the receivers feed back strictly causally and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret - in the information theoretical sense - from all… ▽ More

    Submitted 8 August, 2014; originally announced August 2014.

  34. How to Securely Compute the Modulo-Two Sum of Binary Sources

    Authors: Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran

    Abstract: In secure multiparty computation, mutually distrusting users in a network want to collaborate to compute functions of data which is distributed among the users. The users should not learn any additional information about the data of others than what they may infer from their own data and the functions they are computing. Previous works have mostly considered the worst case context (i.e., without a… ▽ More

    Submitted 26 May, 2014; v1 submitted 11 May, 2014; originally announced May 2014.

    Comments: 6 pages, 1 figure, extended version of submission to IEEE Information Theory Workshop, 2014

  35. arXiv:1405.2049  [pdf, other

    cs.IT cs.CR

    A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels

    Authors: K. Sankeerth Rao, Vinod M. Prabhakaran

    Abstract: We derive a new upper bound on the string oblivious transfer capacity of discrete memoryless channels. The main tool we use is the tension region of a pair of random variables introduced in Prabhakaran and Prabhakaran (2014) where it was used to derive upper bounds on rates of secure sampling in the source model. In this paper, we consider secure computation of string oblivious transfer in the cha… ▽ More

    Submitted 8 May, 2014; originally announced May 2014.

    Comments: 7 pages, 3 figures, extended version of submission to IEEE Information Theory Workshop, 2014

  36. arXiv:1404.6614  [pdf, ps, other

    cs.IT cs.CR

    The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent binary erasure channels, we derive the oblivious transfer capacity for both 2-p… ▽ More

    Submitted 26 April, 2014; originally announced April 2014.

    Comments: This is an extended version of the paper "The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel" to be presented at ISIT 2014

  37. arXiv:1404.5060  [pdf, other

    cs.IT

    Writing on a Dirty Paper in the presence of Jamming

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, the problem of writing on a dirty paper in the presence of jamming is examined. We consider an AWGN channel with an additive white Gaussian state and an additive adversarial jammer. The state is assumed to be known non-causally to the encoder and the jammer but not to the decoder. The capacity of the channel in the presence of a jammer is determined. A surprising result that this ca… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

  38. arXiv:1404.5055  [pdf, other

    cs.IT

    Correlated Jamming in a Joint Source Channel Communication System

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study correlated jamming in joint source-channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission. This user-jammer interaction is modeled as a zero sum game. A set of conditions on the source and the channel is provided for the existence of a Nash equilibrium for this ga… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

  39. arXiv:1312.4378  [pdf, ps, other

    cs.IT

    Is Non-Unique Decoding Necessary?

    Authors: Shirin Saeedi Bidokhti, Vinod M. Prabhakaran

    Abstract: In multi-terminal communication systems, signals carrying messages meant for different destinations are often observed together at any given destination receiver. Han and Kobayashi (1981) proposed a receiving strategy which performs a joint unique decoding of messages of interest along with a subset of messages which are not of interest. It is now well-known that this provides an achievable region… ▽ More

    Submitted 17 March, 2014; v1 submitted 16 December, 2013; originally announced December 2013.

  40. arXiv:1311.7584  [pdf, other

    cs.CR cs.IT

    On the Communication Complexity of Secure Computation

    Authors: Deepesh Data, Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: Information theoretically secure multi-party computation (MPC) is a central primitive of modern cryptography. However, relatively little is known about the communication complexity of this primitive. In this work, we develop powerful information theoretic tools to prove lower bounds on the communication complexity of MPC. We restrict ourselves to a 3-party setting in order to bring out the power… ▽ More

    Submitted 13 April, 2014; v1 submitted 29 November, 2013; originally announced November 2013.

    Comments: 37 pages

  41. arXiv:1211.6598  [pdf, ps, other

    cs.IT

    Estimation of Bandlimited Signals in Additive Gaussian Noise: a "Precision Indifference" Principle

    Authors: Animesh Kumar, Vinod M. Prabhakaran

    Abstract: The sampling, quantization, and estimation of a bounded dynamic-range bandlimited signal affected by additive independent Gaussian noise is studied in this work. For bandlimited signals, the distortion due to additive independent Gaussian noise can be reduced by oversampling (statistical diversity). The pointwise expected mean-squared error is used as a distortion metric for signal estimate in thi… ▽ More

    Submitted 28 November, 2012; originally announced November 2012.

    Comments: Single column, 12 pages, 2 figures, abridged version submitted to IEEE ICASSP 2013

  42. Assisted Common Information with an Application to Secure Two-Party Sampling

    Authors: Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: In this paper we generalize the notion of common information of two dependent variables introduced by Gács & Körner. They defined common information as the largest entropy rate of a common random variable two parties observing one of the sources each can agree upon. It is well-known that their common information captures only a limited form of dependence between the random variables and is zero in… ▽ More

    Submitted 25 March, 2014; v1 submitted 6 June, 2012; originally announced June 2012.

    Comments: 26 pages, 8 figures, to appear in IEEE Transactions on Information Theory

  43. arXiv:1110.5741  [pdf, ps, other

    cs.IT

    Secure Capacity Region for Erasure Broadcast Channels with Feedback

    Authors: László Czap, Vinod M. Prabhakaran, Suhas Diggavi, Christina Fragouli

    Abstract: We formulate and study a cryptographic problem relevant to wireless: a sender, Alice, wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. We ask, at what rates can we broadcast the private messages if we also provide (information-theoretic) unconditional security guarantees that Bob an… ▽ More

    Submitted 26 October, 2011; originally announced October 2011.

  44. Assisted Common Information: Further Results

    Authors: Vinod M. Prabhakaran, Manoj M. Prabhakaran

    Abstract: We presented assisted common information as a generalization of Gács-Körner (GK) common information at ISIT 2010. The motivation for our formulation was to improve upperbounds on the efficiency of protocols for secure two-party sampling (which is a form of secure multi-party computation). Our upperbound was based on a monotonicity property of a rate-region (called the assisted residual information… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: 8 pages, 3 figures, 1 appendix; to be presented at the IEEE International Symposium on Information Theory, 2011

  45. arXiv:1101.5207  [pdf, other

    cs.IT

    Hybrid Digital-Analog Codes for Source-Channel Broadcast of Gaussian Sources over Gaussian Channels

    Authors: Vinod M. Prabhakaran, Rohit Puri, Kannan Ramchandran

    Abstract: The problem of broadcasting a parallel Gaussian source over an additive white Gaussian noise broadcast channel under the mean-squared error distortion criterion is studied. A hybrid digital-analog coding strategy which combines source coding with side information, channel coding with side information, layered source coding, and superposition broadcast channel coding is presented. When specialized… ▽ More

    Submitted 26 January, 2011; originally announced January 2011.

    Comments: 24 pages, 9 figures

  46. Interference Channels with Destination Cooperation

    Authors: Vinod M. Prabhakaran, Pramod Viswanath

    Abstract: Interference is a fundamental feature of the wireless channel. To better understand the role of cooperation in interference management, the two-user Gaussian interference channel where the destination nodes can cooperate by virtue of being able to both transmit and receive is studied. The sum-capacity of this channel is characterized up to a constant number of bits. The coding scheme employed buil… ▽ More

    Submitted 6 November, 2010; v1 submitted 15 July, 2009; originally announced July 2009.

    Comments: revised based on reviewers' comments

    Journal ref: IEEE Trans. Inform. Theory 57 (2011) 187-209

  47. arXiv:0907.1432  [pdf, ps, other

    cs.IT

    Reciprocity in Linear Deterministic Networks under Linear Coding

    Authors: Adnan Raja, Vinod M. Prabhakaran, Pramod Viswanath

    Abstract: The linear deterministic model has been used recently to get a first order understanding of many wireless communication network problems. In many of these cases, it has been pointed out that the capacity regions of the network and its reciprocal (where the communication links are reversed and the roles of the sources and the destinations are swapped) are the same. In this paper, we consider a li… ▽ More

    Submitted 9 July, 2009; originally announced July 2009.

  48. Interference Channels with Source Cooperation

    Authors: Vinod M. Prabhakaran, Pramod Viswanath

    Abstract: The role of cooperation in managing interference - a fundamental feature of the wireless channel - is investigated by studying the two-user Gaussian interference channel where the source nodes can both transmit and receive in full-duplex. The sum-capacity of this channel is obtained within a gap of a constant number of bits. The coding scheme used builds up on the superposition scheme of Han and K… ▽ More

    Submitted 6 November, 2010; v1 submitted 19 May, 2009; originally announced May 2009.

    Comments: revised based on reviewers' comments

    Journal ref: IEEE Trans. Inform. Theory 57 (2011) 156-186

  49. Secrecy via Sources and Channels

    Authors: Vinod M. Prabhakaran, Krishnan Eswaran, Kannan Ramchandran

    Abstract: Alice and Bob want to share a secret key and to communicate an independent message, both of which they desire to be kept secret from an eavesdropper Eve. We study this problem of secret communication and secret key generation when two resources are available -- correlated sources at Alice, Bob, and Eve, and a noisy broadcast channel from Alice to Bob and Eve which is independent of the sources. We… ▽ More

    Submitted 12 June, 2012; v1 submitted 7 July, 2008; originally announced July 2008.

    Comments: 42 pages, 7 figures, to appear in IEEE Transactions on Information Theory

  50. arXiv:0801.3112  [pdf, ps, other

    cs.IT

    The Two User Gaussian Compound Interference Channel

    Authors: Adnan Raja, Vinod M. Prabhakaran, Pramod Viswanath

    Abstract: We introduce the two user finite state compound Gaussian interference channel and characterize its capacity region to within one bit. The main contributions involve both novel inner and outer bounds. The inner bound is multilevel superposition coding, but the decoding of the levels is opportunistic, depending on the channel state. The genie aided outer bound is motivated by the typical error eve… ▽ More

    Submitted 30 April, 2008; v1 submitted 20 January, 2008; originally announced January 2008.