Communication, Control and Signal Processing Seminar
Abstracts of
talks
Spring 2012
02/09
Himanshu Tyagi (UMD), Fault-tolerant secret key generation
Abstract:
Mobile nodes observing correlated data communicate using an insecure
bidirectional switch to generate a secret key, which remains concealed from the switch. We are interested in fault-tolerant
secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before
the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This
upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable.
Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The
upper bound is also tight for the case of a pairwise
independent network model
consisting of a complete graph, and can be attained
by a noninteractive protocol.
This is joint work with Navin Kashyap
(IISc Bangalore), Yogesh Sankarasubramaniam (HP Labs, India), Kapali Viswanathan
(HP Labs, India).
02/23 Alexander Barg
Abstract:
Constructing polar codes for binary-input channels can be
accomplished in a number of ways related to the choice of the polarizing kernel.
At the same time, for nonbinary channels the capacity-achieving performance is
shown by using averaging arguments to prove the existence of polarizing kernels
with the needed properties. In this work we propose an explicit scheme for
attaining channel capacity with polar codes on q-ary channels, q=2^r.
Reference arXiv:1107.4965.
Joint work with Woomyoung Park.
3/1/12 Raef Bassily, A cryptographic
treatment of the wiretap channel: An optimal, explicit, and efficient encryption
Abstract: In this talk, I will present the recent work
of M. Bellare, S.Tessaro, and A. Vardy where they establish important results
that bridge some gaps between the information-theoretic and cryptographic
perspectives to the security problem in the context of wiretap channels. I will
also present a subsequent work of Bellare and Tessaro where they provide the
first explicit polynomial-time construction of an encryption scheme that attains
the secrecy capacity of a class of wiretap channels under a security definition
that is shown to be stronger than the standard one in the information-theoretic
security literature.
In particular, the following contributions are made:
First, new, strong definitions of security in the wiretap model are suggested.
One, called MIS (mutual information security), is an extension of a weaker
definition called MIS-R (mutual information security for random messages) which
is the one in current use in the information theory community. Another, called
SS (semantic security), adapts a definition of security that is well-understood
in the cryptography community, vetted by decades of cryptographic research and
targeted by standards deployed in practice. Next, it is shown that MIS and SS
definitions are indeed equivalent.
3/8/12 Vinay A. Vaishampayan (AT&T Labs), Query Matrices for the Hamming Oracle
Abstract:
x is an unknown binary string of length n. In response
to an n-bit query y, the Hamming oracle returns the Hamming distance d(x,y). The
problem is to construct a set of queries that allow us to determine x based on
the query results. All queries must be set up in advance, i.e. queries are not
allowed to depend on the response of the oracle to preceding queries. Our figure
of merit is the query ratio, i.e. the ratio of the number of queries to the
length of the string.
Connections to the distinct-subset-sum problem and to other more widely known
problems will be explored. Bounds on the achievable query ratio as a function of
the string length n will be derived. An algebraic construction will be presented
along with a decoding algorithm, and it will be shown that query ratios
arbitrarily close to zero can be achieved.
3/15/12 Raef Bassily, cont'd
3/22/12 Spring break
3/29/12 Yuval Lomnitz (Tel Aviv University), Universal communication over
unknown channels (with feedback)
Abstract: A communication problem over an unknown
channel is discussed. Two main settings are presented. In the "individual
channel" setting, there is no model for the channel, and information rates are
defined as a function of the channel input sequence and channel output sequence,
i.e. "what really happened". The range of rate-functions, defining the rate as a
function of the inputs and outputs is explored. In the "unknown vector channel"
setting, the channel has a vector-wise probabilistic model, defining the
probability of every output sequence given every input sequence (not necessarily
stationary), however this probability is unknown to the transmitter and the
receiver. Using low rate feedback, and common randomness, the goal is to
approach the same rates that would be obtained by someone knowing the channel,
but constrained in encoding and decoding complexity.
4/5, 4/12 David Ward (UMD) Introduction to Team Decision Problems
Abstract:
In this introduction to team decision problems, static team
decision problems will be discussed and it will be proven that under
quadratic costs the Bayes team decision function is obtained as a projection.
Under the further assumptions of jointly Gaussian distributions
on the information variables and additional assumptions on the cost function,
the Bayes team decision function will be shown to be linear in the
information variables. This discussion will follow Team Decision Problems by
Radner.
Also, partially nested information patterns will be discussed. It will be shown
that under the assumption of a linear information pattern, partially
nested information patterns are the only ones equivalent to static information
patterns.
4/19, 4/26 Maya Kabkab (UMD) Equilibrium
selection in repeated coordination games
Abstract: In this talk I will discuss equilibrium selection in
repeated coordination games. I will begin by formally defining what a pure
coordination game means, and provide examples. We will then allow a coordination
game, with binary choices, to be played repeatedly by
identical players. We will be interested in the long-run behavior of the
fraction of players playing each action. The equilibrium selection
criteria will be formally characterized for the different dynamics we will
consider. The discussion will follow Equilibrium Selection in n-Person
Coordination Games by Youngse Kim.
5/3 Anup Menon (UMD) Cheeger Inequality and it's implications in the study of Expander Families of Graphs
Abstract: We motivate the study of expanders with a couple of examples relevant to us. We define a combinatorial quantity called edge expansion of a graph and give the combinatorial definition of expander families. The main result that we discuss is Cheeger's inequality. It is a relationship between edge expansion and spectral properties of the graph adjacency matrix for regular graphs and leads to a spectral characterisation of expander families. We follow Luca Trevisan's lecture notes 3 and 4: http://theory.stanford.edu/~trevisan/cs359g/