Skip to main content

Showing 1–41 of 41 results for author: Duffy, K R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11782  [pdf, ps, other

    cs.IT

    Soft-output Guessing Codeword Decoding

    Authors: Ken R. Duffy, Peihong Yuan, Joseph Griffin, Muriel Medard

    Abstract: We establish that it is possible to extract accurate blockwise and bitwise soft output from Guessing Codeword Decoding with minimal additional computational complexity by considering it as a variant of Guessing Random Additive Noise Decoding. Blockwise soft output can be used to control decoding misdetection rate while bitwise soft output results in a soft-input soft-output decoder that can be use… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  3. arXiv:2402.05004  [pdf, ps, other

    cs.IT

    Near-Optimal Generalized Decoding of Polar-like Codes

    Authors: Peihong Yuan, Ken R. Duffy, Muriel Médard

    Abstract: We present a framework that can exploit the tradeoff between the undetected error rate (UER) and block error rate (BLER) of polar-like codes. It is compatible with all successive cancellation (SC)-based decoding methods and relies on a novel approximation that we call codebook probability. This approximation is based on an auxiliary distribution that mimics the dynamics of decoding algorithms foll… ▽ More

    Submitted 2 May, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: being published at IEEE ISIT 2024

  4. arXiv:2310.10737  [pdf, ps, other

    cs.IT

    Soft-output (SO) GRAND and Iterative Decoding to Outperform LDPCs

    Authors: Peihong Yuan, Muriel Medard, Kevin Galligan, Ken R. Duffy

    Abstract: We establish that a large, flexible class of long, high redundancy error correcting codes can be efficiently and accurately decoded with guessing random additive noise decoding (GRAND). Performance evaluation demonstrates that it is possible to construct simple concatenated codes that outperform low-density parity-check (LDPC) codes found in the 5G New Radio standard in both additive white Gaussia… ▽ More

    Submitted 17 June, 2024; v1 submitted 16 October, 2023; originally announced October 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.05777

  5. arXiv:2305.05777  [pdf, ps, other

    cs.IT

    Upgrade error detection to prediction with GRAND

    Authors: Kevin Galligan, Peihong Yuan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of hard- and soft-detection error correction decoding algorithms that provide accurate decoding of any moderate redundancy code of any length. Here we establish a method through which any soft-input GRAND algorithm can provide soft output in the form of an accurate a posteriori estimate of the likelihood that a decoding is correct or, in… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  6. arXiv:2304.00047  [pdf, other

    cs.LG cs.CR cs.IT

    PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

    Authors: Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard

    Abstract: Allowing organizations to share their data for training of machine learning (ML) models without unintended information leakage is an open problem in practice. A promising technique for this still-open problem is to train models on the encoded data. Our approach, called Privately Encoded Open Datasets with Public Labels (PEOPL), uses a certain class of randomly constructed transforms to encode sens… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  7. arXiv:2303.07461  [pdf, other

    cs.IT

    Using channel correlation to improve decoding -- ORBGRAND-AI

    Authors: Ken R. Duffy, Moritz Grundei, Muriel Medard

    Abstract: To meet the Ultra Reliable Low Latency Communication (URLLC) needs of modern applications, there have been significant advances in the development of short error correction codes and corresponding soft detection decoders. A substantial hindrance to delivering low-latency is, however, the reliance on interleaving to break up omnipresent channel correlations to ensure that decoder input matches deco… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  8. arXiv:2301.09778  [pdf, other

    cs.IT

    GRAND-EDGE: A Universal, Jamming-resilient Algorithm with Error-and-Erasure Decoding

    Authors: Furkan Ercan, Kevin Galligan, David Starobinski, Muriel Medard, Ken R. Duffy, Rabia Tugce Yazicigil

    Abstract: Random jammers that overpower transmitted signals are a practical concern for many wireless communication protocols. As such, wireless receivers must be able to cope with standard channel noise and jamming (intentional or unintentional). To address this challenge, we propose a novel method to augment the resilience of the recent family of universal error-correcting GRAND algorithms. This method, c… ▽ More

    Submitted 23 January, 2023; originally announced January 2023.

    Comments: 7 pages, 7 figures, accepted for IEEE ICC 2023 conference

  9. arXiv:2212.05309  [pdf, other

    cs.IT

    Soft detection physical layer insecurity

    Authors: Ken R. Duffy, Muriel Medard

    Abstract: We establish that during the execution of any Guessing Random Additive Noise Decoding (GRAND) algorithm, an interpretable, useful measure of decoding confidence can be evaluated. This measure takes the form of a log-likelihood ratio (LLR) of the hypotheses that, should a decoding be found by a given query, the decoding is correct versus its being incorrect. That LLR can be used as soft output for… ▽ More

    Submitted 12 April, 2023; v1 submitted 10 December, 2022; originally announced December 2022.

    Journal ref: 2023 IEEE Global Communications Conference (Globecom)

  10. Physical layer insecurity

    Authors: Muriel Médard, Ken R. Duffy

    Abstract: In the classic wiretap model, Alice wishes to reliably communicate to Bob without being overheard by Eve who is eavesdrop** over a degraded channel. Systems for achieving that physical layer security often rely on an error correction code whose rate is below the Shannon capacity of Alice and Bob's channel, so Bob can reliably decode, but above Alice and Eve's, so Eve cannot reliably decode. For… ▽ More

    Submitted 16 December, 2022; v1 submitted 2 December, 2022; originally announced December 2022.

    Journal ref: 57th Annual Conference on Information Sciences and Systems (CISS), 2023

  11. arXiv:2210.04061  [pdf, other

    cs.IT cs.CR

    A General Security Approach for Soft-information Decoding against Smart Bursty Jammers

    Authors: Furkan Ercan, Kevin Galligan, Ken R. Duffy, Muriel Medard, David Starobinski, Rabia Tugce Yazicigil

    Abstract: Malicious attacks such as jamming can cause significant disruption or complete denial of service (DoS) to wireless communication protocols. Moreover, jamming devices are getting smarter, making them difficult to detect. Forward error correction, which adds redundancy to data, is commonly deployed to protect communications against the deleterious effects of channel noise. Soft-information error cor… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

    Comments: Accepted for GLOBECOM 2022 Workshops. Contains 7 pages and 7 figures

  12. arXiv:2207.11991  [pdf, other

    cs.IT

    Soft decoding without soft demap** with ORBGRAND

    Authors: Wei An, Muriel Medard, Ken R. Duffy

    Abstract: For spectral efficiency, higher order modulation symbols confer information on more than one bit. As soft detection forward error correction decoders assume the availability of information at binary granularity, however, soft demappers are required to compute per-bit reliabilities from complex-valued signals. Here we show that the recently introduced universal soft detection decoder ORBGRAND can b… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Journal ref: 2023 IEEE International Symposium on Information Theory (ISIT)

  13. arXiv:2207.11149  [pdf, other

    cs.IT

    Block turbo decoding with ORBGRAND

    Authors: Kevin Galligan, Muriel Médard, Ken R. Duffy

    Abstract: Guessing Random Additive Noise Decoding (GRAND) is a family of universal decoding algorithms suitable for decoding any moderate redundancy code of any length. We establish that, through the use of list decoding, soft-input variants of GRAND can replace the Chase algorithm as the component decoder in the turbo decoding of product codes. In addition to being able to decode arbitrary product codes, r… ▽ More

    Submitted 9 August, 2022; v1 submitted 22 July, 2022; originally announced July 2022.

  14. GRAND for Fading Channels using Pseudo-soft Information

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a universal maximum-likelihood decoder that recovers code-words by guessing rank-ordered putative noise sequences and inverting their effect until one or more valid code-words are obtained. This work explores how GRAND can leverage additive-noise statistics and channel-state information in fading channels. Instead of computing per-bit reliability… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings. arXiv admin note: text overlap with arXiv:2207.10836

    Journal ref: 2022 IEEE Global Communications Conference

  15. Soft-input, soft-output joint detection and GRAND

    Authors: Hadi Sarieddeen, Muriel Médard, Ken. R. Duffy

    Abstract: Guessing random additive noise decoding (GRAND) is a maximum likelihood (ML) decoding method that identifies the noise effects corrupting code-words of arbitrary code-books. In a joint detection and decoding framework, this work demonstrates how GRAND can leverage crude soft information in received symbols and channel state information to generate, through guesswork, soft bit reliability outputs i… ▽ More

    Submitted 2 September, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: To appear in the IEEE GLOBECOM 2022 proceedings

    Journal ref: 2022 IEEE Global Communications Conference

  16. arXiv:2203.13552  [pdf, ps, other

    cs.IT

    On the Role of Quantization of Soft Information in GRAND

    Authors: Peihong Yuan, Ken R. Duffy, Evan P. Gabhart, Muriel Médard

    Abstract: In this work, we investigate guessing random additive noise decoding (GRAND) with quantized soft input. First, we analyze the achievable rate of ordered reliability bits GRAND (ORBGRAND), which uses the rank order of the reliability as quantized soft information. We show that multi-line ORBGRAND can approach capacity for any signal-to-noise ratio (SNR). We then introduce discretized soft GRAND (DS… ▽ More

    Submitted 24 November, 2022; v1 submitted 25 March, 2022; originally announced March 2022.

  17. arXiv:2203.12047  [pdf, other

    cs.IT cs.CR

    AES as Error Correction: Cryptosystems for Reliable Communication

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard

    Abstract: In this paper, we show that the Advanced Encryption Standard (AES) cryptosystem can be used as an error-correcting code to obtain reliability over noisy communication and data systems. Moreover, we characterize a family of computational cryptosystems that can potentially be used as well performing error correcting codes. In particular, we show that simple padding followed by a cryptosystem with un… ▽ More

    Submitted 9 September, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

  18. Ordered Reliability Bits Guessing Random Additive Noise Decoding

    Authors: Ken R. Duffy, Wei An, Muriel Medard

    Abstract: Error correction techniques traditionally focus on the co-design of restricted code-structures in tandem with code-specific decoders that are computationally efficient when decoding long codes in hardware. Modern applications are, however, driving demand for ultra-reliable low-latency communications (URLLC), rekindling interest in the performance of shorter, higher-rate error correcting codes, and… ▽ More

    Submitted 29 August, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    MSC Class: 94A15; 68P30

  19. arXiv:2202.03002  [pdf, other

    cs.IT cs.CR

    Partial Encryption after Encoding for Security and Reliability in Data Systems

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard

    Abstract: We consider the problem of secure and reliable communication over a noisy multipath network. Previous work considering a noiseless version of our problem proposed a hybrid universal network coding cryptosystem (HUNCC). By combining an information-theoretically secure encoder together with partial encryption, HUNCC is able to obtain security guarantees, even in the presence of an all-observing eave… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  20. arXiv:2201.12406  [pdf, other

    cs.LG cs.CR cs.CV

    Syfer: Neural Obfuscation for Private Data Release

    Authors: Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay

    Abstract: Balancing privacy and predictive utility remains a central challenge for machine learning in healthcare. In this paper, we develop Syfer, a neural obfuscation method to protect against re-identification attacks. Syfer composes trained layers with random neural networks to encode the original data (e.g. X-rays) while maintaining the ability to predict diagnoses from the encoded data. The randomness… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  21. arXiv:2106.02484  [pdf, other

    cs.CR cs.AI

    NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training

    Authors: Adam Yala, Homa Esfahanizadeh, Rafael G. L. D' Oliveira, Ken R. Duffy, Manya Ghobadi, Tommi S. Jaakkola, Vinod Vaikuntanathan, Regina Barzilay, Muriel Medard

    Abstract: Balancing the needs of data privacy and predictive utility is a central challenge for machine learning in healthcare. In particular, privacy concerns have led to a dearth of public datasets, complicated the construction of multi-hospital cohorts and limited the utilization of external machine learning resources. To remedy this, new methods are required to enable data owners, such as hospitals, to… ▽ More

    Submitted 4 June, 2021; originally announced June 2021.

  22. CRC Codes as Error Correction Codes

    Authors: Wei An, Muriel Médard, Ken R. Duffy

    Abstract: CRC codes have long since been adopted in a vast range of applications. The established notion that they are suitable primarily for error detection can be set aside through use of the recently proposed Guessing Random Additive Noise Decoding (GRAND). Hard-detection (GRAND-SOS) and soft-detection (ORBGRAND) variants can decode any short, high-rate block code, making them suitable for error correcti… ▽ More

    Submitted 28 April, 2021; originally announced April 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    Journal ref: IEEE ICC 2021

  23. Keep the bursts and ditch the interleavers

    Authors: Wei An, Muriel Médard, Ken R. Duffy

    Abstract: To facilitate applications in IoT, 5G, and beyond, there is an engineering need to enable high-rate, low-latency communications. Errors in physical channels typically arrive in clumps, but most decoders are designed assuming that channels are memoryless. As a result, communication networks rely on interleaving over tens of thousands of bits so that channel conditions match decoder assumptions. Eve… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages

    Journal ref: 2020 IEEE Global Communications Conference

  24. arXiv:2010.07791  [pdf, other

    cs.IT

    Noise Recycling

    Authors: Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: We introduce Noise Recycling, a method that enhances decoding performance of channels subject to correlated noise without joint decoding. The method can be used with any combination of codes, code-rates and decoding techniques. In the approach, a continuous realization of noise is estimated from a lead channel by subtracting its decoded output from its received signal. This estimate is then used t… ▽ More

    Submitted 12 October, 2020; originally announced October 2020.

    Comments: Appear in IEEE International Symposium on Information Theory, ISIT 2020, based on arXiv:2006.04897

  25. arXiv:2006.04897  [pdf, other

    cs.IT

    Noise Recycling

    Authors: Alejandro Cohen, Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: We introduce Noise Recycling, a method that substantially enhances decoding performance of orthogonal channels subject to correlated noise without the need for joint encoding or decoding. The method can be used with any combination of codes, code-rates and decoding techniques. In the approach, a continuous realization of noise is estimated from a lead channel by subtracting its decoded output from… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

  26. arXiv:2001.03089  [pdf, other

    cs.IT

    Soft Maximum Likelihood Decoding using GRAND

    Authors: Amit Solomon, Ken R. Duffy, Muriel Médard

    Abstract: Maximum Likelihood (ML) decoding of forward error correction codes is known to be optimally accurate, but is not used in practice as it proves too challenging to efficiently implement. Here we introduce a ML decoder called SGRAND, which is a development of a previously described hard detection ML decoder called GRAND, that fully avails of soft detection information and is suitable for use with any… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

  27. Ordered Reliability Bits Guessing Random Additive Noise Decoding

    Authors: Ken R. Duffy

    Abstract: Modern applications are driving demand for ultra-reliable low-latency communications, rekindling interest in the performance of short, high-rate error correcting codes. To that end, here we introduce a soft-detection variant of Guessing Random Additive Noise Decoding (GRAND) called Ordered Reliability Bits GRAND that can decode any short, high-rate block-code. For a code of $n$ bits, it avails of… ▽ More

    Submitted 4 October, 2020; v1 submitted 2 January, 2020; originally announced January 2020.

    Journal ref: IEEE ICASSP 2021

  28. arXiv:1902.03796  [pdf, other

    cs.IT

    Guessing random additive noise decoding with symbol reliability information (SRGRAND)

    Authors: Ken R. Duffy, Muriel Médard, Wei An

    Abstract: The design and implementation of error correcting codes has long been informed by two fundamental results: Shannon's 1948 capacity theorem, which established that long codes use noisy channels most efficiently; and Berlekamp, McEliece, and Van Tilborg's 1978 theorem on the NP-hardness of decoding linear codes. These results shifted focus away from creating code-independent decoders, but recent low… ▽ More

    Submitted 23 August, 2021; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    MSC Class: E.4 ACM Class: E.4

  29. Capacity-achieving Guessing Random Additive Noise Decoding (GRAND)

    Authors: Ken R. Duffy, Jiange Li, Muriel Médard

    Abstract: We introduce a new algorithm for realizing Maximum Likelihood (ML) decoding in discrete channels with or without memory. In it, the receiver rank orders noise sequences from most likely to least likely. Subtracting noise from the received signal in that order, the first instance that results in a member of the code-book is the ML decoding. We name this algorithm GRAND for Guessing Random Additive… ▽ More

    Submitted 22 March, 2019; v1 submitted 20 February, 2018; originally announced February 2018.

    Comments: IEEE Transactions on Information Theory, to appear

    MSC Class: 94A24 ACM Class: E.4

    Journal ref: IEEE Transactions on Information Theory, 65 (7), 4023-4040, 2019

  30. arXiv:1710.00447  [pdf, other

    cs.IT cs.LG

    Privacy with Estimation Guarantees

    Authors: Hao Wang, Lisa Vo, Flavio P. Calmon, Muriel Médard, Ken R. Duffy, Mayank Varia

    Abstract: We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the data. In this setting, we present an estimation-theoretic analysis of the privacy-utility trade-off (PUT). Here, an analyst is allowed to reconstruct (in a mean-squared error sense) certain functions of the data (utility), while other private… ▽ More

    Submitted 20 March, 2020; v1 submitted 1 October, 2017; originally announced October 2017.

  31. arXiv:1704.00820  [pdf, ps, other

    cs.IT

    Principal Inertia Components and Applications

    Authors: Flavio P. Calmon, Ali Makhdoumi, Muriel Médard, Mayank Varia, Mark Christiansen, Ken R. Duffy

    Abstract: We explore properties and applications of the Principal Inertia Components (PICs) between two discrete random variables $X$ and $Y$. The PICs lie in the intersection of information and estimation theory, and provide a fine-grained decomposition of the dependence between $X$ and $Y$. Moreover, the PICs describe which functions of $X$ can or cannot be reliably inferred (in terms of MMSE) given an ob… ▽ More

    Submitted 3 April, 2017; originally announced April 2017.

    Comments: Overlaps with arXiv:1405.1472 and arXiv:1310.1512

  32. arXiv:1503.08513  [pdf, ps, other

    cs.IT

    Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security

    Authors: Flavio du Pin Calmon, Muriel Médard, Mayank Varia, Ken R. Duffy, Mark M. Christiansen, Linda M. Zeger

    Abstract: We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and another akin to rate-distortion theory. We start by presenting a new information-theoretic metric for security, called symbol secrecy, and derive… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  33. Multi-user guesswork and brute force security

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: The Guesswork problem was originally motivated by a desire to quantify computational security for single user systems. Leveraging recent results from its analysis, we extend the remit and utility of the framework to the quantification of the computational security for multi-user systems. In particular, assume that $V$ users independently select strings stochastically from a finite, but potentially… ▽ More

    Submitted 3 August, 2017; v1 submitted 20 May, 2014; originally announced May 2014.

    Journal ref: EEE Transactions on Information Theory, 61 (12), 6876-6886 (2015)

  34. arXiv:1311.1053  [pdf, other

    cs.IT

    Guessing a password over a wireless channel (on the effect of noise non-uniformity)

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: A string is sent over a noisy channel that erases some of its characters. Knowing the statistical properties of the string's source and which characters were erased, a listener that is equipped with an ability to test the veracity of a string, one string at a time, wishes to fill in the missing pieces. Here we characterize the influence of the stochastic properties of both the string's source and… ▽ More

    Submitted 26 November, 2013; v1 submitted 5 November, 2013; originally announced November 2013.

    Comments: Asilomar Conference on Signals, Systems & Computers, 2013

  35. arXiv:1310.1512  [pdf, ps, other

    cs.IT

    Bounds on inference

    Authors: Flavio du Pin Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy, Stefano Tessaro

    Abstract: Lower bounds for the average probability of error of estimating a hidden variable X given an observation of a correlated random variable Y, and Fano's inequality in particular, play a central role in information theory. In this paper, we present a lower bound for the average estimation error based on the marginal distribution of X and the principal inertias of the joint distribution matrix of X an… ▽ More

    Submitted 5 October, 2013; originally announced October 2013.

    Comments: Allerton 2013 with extended proof, 10 pages

  36. arXiv:1301.6356  [pdf, other

    cs.IT cs.CR

    Brute force searching, the typical set and Guesswork

    Authors: Mark M. Christiansen, Ken R. Duffy, Flavio du Pin Calmon, Muriel Medard

    Abstract: Consider the situation where a word is chosen probabilistically from a finite list. If an attacker knows the list and can inquire about each word in turn, then selecting the word via the uniform distribution maximizes the attacker's difficulty, its Guesswork, in identifying the chosen word. It is tempting to use this property in cryptanalysis of computationally secure ciphers by assuming coded wor… ▽ More

    Submitted 13 May, 2013; v1 submitted 27 January, 2013; originally announced January 2013.

    Comments: ISIT 2013, with extended proof

  37. arXiv:1210.2126  [pdf, ps, other

    cs.IT cs.CR

    Lists that are smaller than their parts: A coding approach to tunable secrecy

    Authors: Flavio du Pin Calmon, Muriel Médard, Linda M. Zeger, João Barros, Mark M. Christiansen, Ken. R. Duffy

    Abstract: We present a new information-theoretic definition and associated results, based on list decoding in a source coding setting. We begin by presenting list-source codes, which naturally map a key length (entropy) to list size. We then show that such codes can be analyzed in the context of a novel information-theoretic metric, ε-symbol secrecy, that encompasses both the one-time pad and traditional ra… ▽ More

    Submitted 7 October, 2012; originally announced October 2012.

    Comments: Allerton 2012, 8 pages

  38. Guesswork, large deviations and Shannon entropy

    Authors: Mark M. Christiansen, Ken R. Duffy

    Abstract: How hard is it guess a password? Massey showed that that the Shannon entropy of the distribution from which the password is selected is a lower bound on the expected number of guesses, but one which is not tight in general. In a series of subsequent papers under ever less restrictive stochastic assumptions, an asymptotic relationship as password length grows between scaled moments of the guesswork… ▽ More

    Submitted 21 June, 2012; v1 submitted 18 May, 2012; originally announced May 2012.

    MSC Class: 94A17

    Journal ref: IEEE Transactions on Information Theory, 59 (2), 796-802 2013

  39. Decentralized Constraint Satisfaction

    Authors: K. R. Duffy, C. Bordenave, D. J. Leith

    Abstract: We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practic… ▽ More

    Submitted 9 October, 2012; v1 submitted 2 March, 2011; originally announced March 2011.

    ACM Class: F.2.0

    Journal ref: IEEE/ACM Transactions on Networking, 21 (4), 1298-1308, 2013

  40. Log-Convexity of Rate Region in 802.11e WLANs

    Authors: Douglas J. Leith, Vijay G. Subramanian, Ken R. Duffy

    Abstract: In this paper we establish the log-convexity of the rate region in 802.11 WLANs. This generalises previous results for Aloha networks and has immediate implications for optimisation based approaches to the analysis and design of 802.11 wireless networks.

    Submitted 22 February, 2011; originally announced February 2011.

    Journal ref: IEEE Communications Letters, 14(1), pp57-59, 2010

  41. Decentralised Learning MACs for Collision-free Access in WLANs

    Authors: Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith

    Abstract: By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amou… ▽ More

    Submitted 2 March, 2011; v1 submitted 22 September, 2010; originally announced September 2010.

    Journal ref: Springer Wireless Networks 2013, Volume 19, Issue 1, pp 83-98