Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION


The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmit one classical bit.

Paper Details

Authors:
Khaled Elleithy
Submitted On:
15 March 2017 - 11:03am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Alshowkan_Elleithy_ICASSP2017.pdf

(42 downloads)

Keywords

Subscribe

[1] Khaled Elleithy, "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1768. Accessed: Aug. 17, 2017.
@article{1768-17,
url = {http://sigport.org/1768},
author = {Khaled Elleithy },
publisher = {IEEE SigPort},
title = {DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION},
year = {2017} }
TY - EJOUR
T1 - DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION
AU - Khaled Elleithy
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1768
ER -
Khaled Elleithy. (2017). DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. IEEE SigPort. http://sigport.org/1768
Khaled Elleithy, 2017. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. Available at: http://sigport.org/1768.
Khaled Elleithy. (2017). "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION." Web.
1. Khaled Elleithy. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1768

TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING

Paper Details

Authors:
Guo An Han, Liang Xiao, H.Vincent Poor
Submitted On:
27 February 2017 - 10:29pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster_ICASSP17_paper1551.pdf

(74 downloads)

Keywords

Subscribe

[1] Guo An Han, Liang Xiao, H.Vincent Poor, "TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1471. Accessed: Aug. 17, 2017.
@article{1471-17,
url = {http://sigport.org/1471},
author = {Guo An Han; Liang Xiao; H.Vincent Poor },
publisher = {IEEE SigPort},
title = {TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING},
year = {2017} }
TY - EJOUR
T1 - TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING
AU - Guo An Han; Liang Xiao; H.Vincent Poor
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1471
ER -
Guo An Han, Liang Xiao, H.Vincent Poor. (2017). TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING. IEEE SigPort. http://sigport.org/1471
Guo An Han, Liang Xiao, H.Vincent Poor, 2017. TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING. Available at: http://sigport.org/1471.
Guo An Han, Liang Xiao, H.Vincent Poor. (2017). "TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING." Web.
1. Guo An Han, Liang Xiao, H.Vincent Poor. TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1471

Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks


This paper considers asymptotic perfect secrecy and asymptotic perfect estimation in distributed estimation for large sensor networks under threat of an eavesdropper, which has access to all sensor outputs. To measure secrecy, we compare the estimation performance at the fusion center and at eavesdropper in terms of their respective Fisher Information. We analyze the Fisher Information ratio between the fusion center and eavesdropper and derive the maximum achievable ratio when the channels between sensors and eavesdropper are noisy binary symmetric channels.

Paper Details

Authors:
Jun Guo, Hao Chen, Uri Rogers
Submitted On:
27 February 2017 - 8:52pm
Short Link:
Type:

Document Files

icassp_2017.pdf

(63 downloads)

Keywords

Subscribe

[1] Jun Guo, Hao Chen, Uri Rogers, "Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1461. Accessed: Aug. 17, 2017.
@article{1461-17,
url = {http://sigport.org/1461},
author = {Jun Guo; Hao Chen; Uri Rogers },
publisher = {IEEE SigPort},
title = {Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks},
year = {2017} }
TY - EJOUR
T1 - Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks
AU - Jun Guo; Hao Chen; Uri Rogers
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1461
ER -
Jun Guo, Hao Chen, Uri Rogers. (2017). Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks. IEEE SigPort. http://sigport.org/1461
Jun Guo, Hao Chen, Uri Rogers, 2017. Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks. Available at: http://sigport.org/1461.
Jun Guo, Hao Chen, Uri Rogers. (2017). "Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks." Web.
1. Jun Guo, Hao Chen, Uri Rogers. Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1461

Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding


Different transforms are compared to extract bit sequences used in secret-key binding for highly-correlated physical-identifier outputs. A set of transforms that perform well in terms of decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the reliability and uniqueness of the extracted sequence, information leakage to an eavesdropper about the secret key and RO outputs, secret-key length, and hardware cost.

Paper Details

Authors:
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
Submitted On:
2 December 2016 - 7:00am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Poster_GlobalSIP.pdf

(92 downloads)

Keywords

Subscribe

[1] Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, "Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1329. Accessed: Aug. 17, 2017.
@article{1329-16,
url = {http://sigport.org/1329},
author = {Onur Günlü; Onurcan Iscan; Vladimir Sidorenko; Gerhard Kramer },
publisher = {IEEE SigPort},
title = {Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding},
year = {2016} }
TY - EJOUR
T1 - Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding
AU - Onur Günlü; Onurcan Iscan; Vladimir Sidorenko; Gerhard Kramer
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1329
ER -
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. (2016). Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding. IEEE SigPort. http://sigport.org/1329
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, 2016. Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding. Available at: http://sigport.org/1329.
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. (2016). "Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding." Web.
1. Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1329

Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels


We propose a simple protocol which allows two legitimate parties to exchange some confidential message over a wireless
channel with some chosen level of semantic security against passive eavesdroppers, and without needing either secret or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We also define suitable metrics to estimate the semantic security level in the considered setting.

Paper Details

Authors:
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce
Submitted On:
2 December 2016 - 5:45am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Achieving semantic security without keys through coding and all-or-nothing transforms over wireless channels.pdf

(64 downloads)

Keywords

Subscribe

[1] Marco Baldi, Linda Senigagliesi, Franco Chiaraluce, "Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1328. Accessed: Aug. 17, 2017.
@article{1328-16,
url = {http://sigport.org/1328},
author = {Marco Baldi; Linda Senigagliesi; Franco Chiaraluce },
publisher = {IEEE SigPort},
title = {Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels},
year = {2016} }
TY - EJOUR
T1 - Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels
AU - Marco Baldi; Linda Senigagliesi; Franco Chiaraluce
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1328
ER -
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. (2016). Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels. IEEE SigPort. http://sigport.org/1328
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce, 2016. Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels. Available at: http://sigport.org/1328.
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. (2016). "Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels." Web.
1. Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1328

PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER

Paper Details

Authors:
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han
Submitted On:
7 December 2016 - 10:49am
Short Link:
Type:
Event:
Paper Code:
Document Year:
Cite

Document Files

1257-poster.pdf

(78 downloads)

Keywords

Subscribe

[1] Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han, "PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1319. Accessed: Aug. 17, 2017.
@article{1319-16,
url = {http://sigport.org/1319},
author = {Wei Huang; Wei Chen; Bo Bai; Shidong Zhou; and Zhu Han },
publisher = {IEEE SigPort},
title = {PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER},
year = {2016} }
TY - EJOUR
T1 - PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER
AU - Wei Huang; Wei Chen; Bo Bai; Shidong Zhou; and Zhu Han
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1319
ER -
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. (2016). PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER. IEEE SigPort. http://sigport.org/1319
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han, 2016. PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER. Available at: http://sigport.org/1319.
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. (2016). "PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER." Web.
1. Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1319

Privacy-Preserving Energy Flow Control in Smart Grids

Paper Details

Authors:
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund
Submitted On:
23 March 2016 - 11:03am
Short Link:
Type:
Event:
Presenter's Name:

Document Files

Zuxing Li.pdf

(195 downloads)

Keywords

Subscribe

[1] Zuxing Li, Tobias J. Oechtering, Mikael Skoglund, "Privacy-Preserving Energy Flow Control in Smart Grids", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/995. Accessed: Aug. 17, 2017.
@article{995-16,
url = {http://sigport.org/995},
author = {Zuxing Li; Tobias J. Oechtering; Mikael Skoglund },
publisher = {IEEE SigPort},
title = {Privacy-Preserving Energy Flow Control in Smart Grids},
year = {2016} }
TY - EJOUR
T1 - Privacy-Preserving Energy Flow Control in Smart Grids
AU - Zuxing Li; Tobias J. Oechtering; Mikael Skoglund
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/995
ER -
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. (2016). Privacy-Preserving Energy Flow Control in Smart Grids. IEEE SigPort. http://sigport.org/995
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund, 2016. Privacy-Preserving Energy Flow Control in Smart Grids. Available at: http://sigport.org/995.
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. (2016). "Privacy-Preserving Energy Flow Control in Smart Grids." Web.
1. Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. Privacy-Preserving Energy Flow Control in Smart Grids [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/995

HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION

Paper Details

Authors:
ji-won yoon
Submitted On:
22 March 2016 - 10:15am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

ICASSP2016_poster_jooimkim.pdf

(147 downloads)

Keywords

Subscribe

[1] ji-won yoon, "HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/969. Accessed: Aug. 17, 2017.
@article{969-16,
url = {http://sigport.org/969},
author = {ji-won yoon },
publisher = {IEEE SigPort},
title = {HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION},
year = {2016} }
TY - EJOUR
T1 - HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION
AU - ji-won yoon
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/969
ER -
ji-won yoon. (2016). HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION. IEEE SigPort. http://sigport.org/969
ji-won yoon, 2016. HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION. Available at: http://sigport.org/969.
ji-won yoon. (2016). "HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION." Web.
1. ji-won yoon. HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/969

RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY


This is an overview poster on designing a privacy-preserving randomized requantization scheme which simultaneously guarantees local differential privacy and reduces bit-rate of input signals.

For more information, please check out the publication at IEEE Xplore:

S. Xiong, A.D. Sarwate, and N.B. Mandayam, “Randomized requantization with local differential privacy,” in Proceedings of the 41st International Conference on Acoustics, Speech and Signal Processing, March 2016.

ICASSP2016.pdf

PDF icon ICASSP2016.pdf (214 downloads)

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
20 March 2016 - 9:49pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

ICASSP2016.pdf

(214 downloads)

Keywords

Additional Categories

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/900. Accessed: Aug. 17, 2017.
@article{900-16,
url = {http://sigport.org/900},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY},
year = {2016} }
TY - EJOUR
T1 - RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/900
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. IEEE SigPort. http://sigport.org/900
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2016. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. Available at: http://sigport.org/900.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/900

RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY


This is an overview poster on designing a privacy-preserving randomized requantization scheme which simultaneously guarantees local differential privacy and reduces bit-rate of input signals.

For more information, please check out the publication at IEEE Xplore:

S. Xiong, A.D. Sarwate, and N.B. Mandayam, “Randomized requantization with local differential privacy,” in Proceedings of the 41st International Conference on Acoustics, Speech and Signal Processing, March 2016.

ICASSP2016.pdf

PDF icon ICASSP2016.pdf (214 downloads)

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
20 March 2016 - 9:49pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

ICASSP2016.pdf

(214 downloads)

Keywords

Additional Categories

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/899. Accessed: Aug. 17, 2017.
@article{899-16,
url = {http://sigport.org/899},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY},
year = {2016} }
TY - EJOUR
T1 - RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/899
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. IEEE SigPort. http://sigport.org/899
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2016. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. Available at: http://sigport.org/899.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/899

Pages