**Communication, Control and Signal
Processing Seminar** ** **

**Abstracts of
talks**

**Spring 2012**

**02/09
Himanshu Tyagi (UMD), Fault-tolerant secret key generation**

**Abstract:
**Mobile nodes observing correlated data communicate using an insecure
bidirectional switch to generate a secret key, which remains concealed from the switch. We are interested in fault-tolerant
secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before
the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This
upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable.
Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The
upper bound is also tight for the case of a pairwise
independent network model
consisting of a complete graph, and can be attained
by a noninteractive protocol.

This is joint work with Navin Kashyap
(IISc Bangalore), Yogesh Sankarasubramaniam (HP Labs, India), Kapali Viswanathan
(HP Labs, India).

**02/23 Alexander Barg (UMD)
Polar codes for q-ary channels, q=2^r**

**Abstract:
**Constructing polar codes for binary-input channels can be
accomplished in a number of ways related to the choice of the polarizing kernel.
At the same time, for nonbinary channels the capacity-achieving performance is
shown by using averaging arguments to prove the existence of polarizing kernels
with the needed properties. In this work we propose an explicit scheme for
attaining channel capacity with polar codes on q-ary channels, q=2^r.

Reference arXiv:1107.4965.

Joint work with Woomyoung Park.

**3/1/12 Raef Bassily, A cryptographic
treatment of the wiretap channel: An optimal, explicit, and efficient encryption
Abstract: **In this talk, I will present the recent work
of M. Bellare, S.Tessaro, and A. Vardy where they establish important results
that bridge some gaps between the information-theoretic and cryptographic
perspectives to the security problem in the context of wiretap channels. I will
also present a subsequent work of Bellare and Tessaro where they provide the
first explicit polynomial-time construction of an encryption scheme that attains
the secrecy capacity of a class of wiretap channels under a security definition
that is shown to be stronger than the standard one in the information-theoretic
security literature.

In particular, the following contributions are made:

First, new, strong definitions of security in the wiretap model are suggested. One, called MIS (mutual information security), is an extension of a weaker definition called MIS-R (mutual information security for random messages) which is the one in current use in the information theory community. Another, called SS (semantic security), adapts a definition of security that is well-understood in the cryptography community, vetted by decades of cryptographic research and targeted by standards deployed in practice. Next, it is shown that MIS and SS definitions are indeed equivalent.

3/8/12 Vinay A. Vaishampayan (AT&T Labs), Query Matrices for the Hamming Oracle

**Abstract:****
**x is an unknown binary string of length n. In response
to an n-bit query y, the Hamming oracle returns the Hamming distance d(x,y). The
problem is to construct a set of queries that allow us to determine x based on
the query results. All queries must be set up in advance, i.e. queries are not
allowed to depend on the response of the oracle to preceding queries. Our figure
of merit is the query ratio, i.e. the ratio of the number of queries to the
length of the string.

Connections to the distinct-subset-sum problem and to other more widely known
problems will be explored. Bounds on the achievable query ratio as a function of
the string length n will be derived. An algebraic construction will be presented
along with a decoding algorithm, and it will be shown that query ratios
arbitrarily close to zero can be achieved.

**3/15/12 Raef Bassily, cont'd
3/22/12 Spring break
3/29/12 Yuval Lomnitz (Tel Aviv University), Universal communication over
unknown channels (with feedback)
Abstract: **A communication problem over an unknown
channel is discussed. Two main settings are presented. In the "individual
channel" setting, there is no model for the channel, and information rates are
defined as a function of the channel input sequence and channel output sequence,

i.e. "what really happened". The range of rate-functions, defining the rate as a function of the inputs and outputs is explored. In the "unknown vector channel" setting, the channel has a vector-wise probabilistic model, defining the probability of every output sequence given every input sequence (not necessarily stationary), however this probability is unknown to the transmitter and the receiver. Using low rate feedback, and common randomness, the goal is to approach the same rates that would be obtained by someone knowing the channel, but constrained in encoding and decoding complexity.

4/5, 4/12 David Ward (UMD) Introduction to Team Decision Problems

Abstract:

quadratic costs the Bayes team decision function is obtained as a projection. Under the further assumptions of jointly Gaussian distributions

on the information variables and additional assumptions on the cost function, the Bayes team decision function will be shown to be linear in the

information variables. This discussion will follow Team Decision Problems by Radner.

Also, partially nested information patterns will be discussed. It will be shown that under the assumption of a linear information pattern, partially

nested information patterns are the only ones equivalent to static information patterns.

**4/19, 4/26 Maya Kabkab (UMD) Equilibrium
selection in repeated coordination games
Abstract: **In this talk I will discuss equilibrium selection in
repeated coordination games. I will begin by formally defining what a pure

coordination game means, and provide examples. We will then allow a coordination game, with binary choices, to be played repeatedly by

identical players. We will be interested in the long-run behavior of the fraction of players playing each action. The equilibrium selection

criteria will be formally characterized for the different dynamics we will consider. The discussion will follow Equilibrium Selection in n-Person Coordination Games by Youngse Kim.

**5/3 Anup Menon (UMD) Cheeger Inequality and it's
implications in the study of Expander Families of Graphs**

**Abstract: **We motivate the study of
expanders with a couple of examples relevant to us. We define a combinatorial
quantity called edge expansion of a graph and give the combinatorial definition
of expander families. The main result that we discuss is Cheeger's
inequality. It is a relationship between edge expansion and spectral properties
of the graph adjacency matrix for regular graphs and leads to a spectral
characterisation of expander families. We follow Luca Trevisan's lecture notes 3
and 4: http://theory.stanford.edu/~trevisan/cs359g/