Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels


We propose a simple protocol which allows two legitimate parties to exchange some confidential message over a wireless
channel with some chosen level of semantic security against passive eavesdroppers, and without needing either secret or public keys. The proposed method leverages the noisy and fading nature of the channel and exploits coding and all-or-nothing transforms to achieve the desired level of semantic security. We also define suitable metrics to estimate the semantic security level in the considered setting.

Paper Details

Authors:
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce
Submitted On:
2 December 2016 - 5:45am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Achieving semantic security without keys through coding and all-or-nothing transforms over wireless channels.pdf

(64)

Subscribe

[1] Marco Baldi, Linda Senigagliesi, Franco Chiaraluce, "Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1328. Accessed: Apr. 24, 2019.
@article{1328-16,
url = {http://sigport.org/1328},
author = {Marco Baldi; Linda Senigagliesi; Franco Chiaraluce },
publisher = {IEEE SigPort},
title = {Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels},
year = {2016} }
TY - EJOUR
T1 - Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels
AU - Marco Baldi; Linda Senigagliesi; Franco Chiaraluce
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1328
ER -
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. (2016). Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels. IEEE SigPort. http://sigport.org/1328
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce, 2016. Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels. Available at: http://sigport.org/1328.
Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. (2016). "Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels." Web.
1. Marco Baldi, Linda Senigagliesi, Franco Chiaraluce. Achieving Semantic Security Without Keys Through Coding And All-Or-Nothing Transforms Over Wireless Channels [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1328

PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER

Paper Details

Authors:
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han
Submitted On:
7 December 2016 - 10:49am
Short Link:
Type:
Event:
Paper Code:
Document Year:
Cite

Document Files

1257-poster.pdf

(307)

Subscribe

[1] Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han, "PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1319. Accessed: Apr. 24, 2019.
@article{1319-16,
url = {http://sigport.org/1319},
author = {Wei Huang; Wei Chen; Bo Bai; Shidong Zhou; and Zhu Han },
publisher = {IEEE SigPort},
title = {PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER},
year = {2016} }
TY - EJOUR
T1 - PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER
AU - Wei Huang; Wei Chen; Bo Bai; Shidong Zhou; and Zhu Han
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1319
ER -
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. (2016). PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER. IEEE SigPort. http://sigport.org/1319
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han, 2016. PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER. Available at: http://sigport.org/1319.
Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. (2016). "PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER." Web.
1. Wei Huang, Wei Chen, Bo Bai, Shidong Zhou, and Zhu Han. PHYSICAL LAYER SECURITY GAME WITH FULL-DUPLEX PROACTIVE EAVESDROPPER [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1319

Privacy-Preserving Energy Flow Control in Smart Grids

Paper Details

Authors:
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund
Submitted On:
23 March 2016 - 11:03am
Short Link:
Type:
Event:
Presenter's Name:

Document Files

Zuxing Li.pdf

(119)

Subscribe

[1] Zuxing Li, Tobias J. Oechtering, Mikael Skoglund, "Privacy-Preserving Energy Flow Control in Smart Grids", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/995. Accessed: Apr. 24, 2019.
@article{995-16,
url = {http://sigport.org/995},
author = {Zuxing Li; Tobias J. Oechtering; Mikael Skoglund },
publisher = {IEEE SigPort},
title = {Privacy-Preserving Energy Flow Control in Smart Grids},
year = {2016} }
TY - EJOUR
T1 - Privacy-Preserving Energy Flow Control in Smart Grids
AU - Zuxing Li; Tobias J. Oechtering; Mikael Skoglund
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/995
ER -
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. (2016). Privacy-Preserving Energy Flow Control in Smart Grids. IEEE SigPort. http://sigport.org/995
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund, 2016. Privacy-Preserving Energy Flow Control in Smart Grids. Available at: http://sigport.org/995.
Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. (2016). "Privacy-Preserving Energy Flow Control in Smart Grids." Web.
1. Zuxing Li, Tobias J. Oechtering, Mikael Skoglund. Privacy-Preserving Energy Flow Control in Smart Grids [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/995

HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION

Paper Details

Authors:
ji-won yoon
Submitted On:
22 March 2016 - 10:15am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

ICASSP2016_poster_jooimkim.pdf

(413)

Subscribe

[1] ji-won yoon, "HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/969. Accessed: Apr. 24, 2019.
@article{969-16,
url = {http://sigport.org/969},
author = {ji-won yoon },
publisher = {IEEE SigPort},
title = {HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION},
year = {2016} }
TY - EJOUR
T1 - HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION
AU - ji-won yoon
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/969
ER -
ji-won yoon. (2016). HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION. IEEE SigPort. http://sigport.org/969
ji-won yoon, 2016. HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION. Available at: http://sigport.org/969.
ji-won yoon. (2016). "HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION." Web.
1. ji-won yoon. HONEY CHATTING: A NOVEL INSTANT MESSAGING SYSTEM ROBUST TO EAVESDROPPING OVER COMMUNICATION [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/969

RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY


This is an overview poster on designing a privacy-preserving randomized requantization scheme which simultaneously guarantees local differential privacy and reduces bit-rate of input signals.

For more information, please check out the publication at IEEE Xplore:

S. Xiong, A.D. Sarwate, and N.B. Mandayam, “Randomized requantization with local differential privacy,” in Proceedings of the 41st International Conference on Acoustics, Speech and Signal Processing, March 2016.

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
13 April 2018 - 6:15pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

IEEE_ICASSP2016_POSTER

(643)

Keywords

Additional Categories

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/900. Accessed: Apr. 24, 2019.
@article{900-16,
url = {http://sigport.org/900},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY},
year = {2016} }
TY - EJOUR
T1 - RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/900
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. IEEE SigPort. http://sigport.org/900
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2016. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. Available at: http://sigport.org/900.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/900

RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY


This is an overview poster on designing a privacy-preserving randomized requantization scheme which simultaneously guarantees local differential privacy and reduces bit-rate of input signals.

For more information, please check out the publication at IEEE Xplore:

S. Xiong, A.D. Sarwate, and N.B. Mandayam, “Randomized requantization with local differential privacy,” in Proceedings of the 41st International Conference on Acoustics, Speech and Signal Processing, March 2016.

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
20 March 2016 - 9:49pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

ICASSP2016.pdf

(643)

Keywords

Additional Categories

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/899. Accessed: Apr. 24, 2019.
@article{899-16,
url = {http://sigport.org/899},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY},
year = {2016} }
TY - EJOUR
T1 - RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/899
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. IEEE SigPort. http://sigport.org/899
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2016. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. Available at: http://sigport.org/899.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/899

RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY


This is an overview poster on designing a privacy-preserving randomized requantization scheme which simultaneously guarantees local differential privacy and reduces bit-rate of input signals.

For more information, please check out the publication at IEEE Xplore:

S. Xiong, A.D. Sarwate, and N.B. Mandayam, “Randomized requantization with local differential privacy,” in Proceedings of the 41st International Conference on Acoustics, Speech and Signal Processing, March 2016.

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
20 March 2016 - 9:49pm
Short Link:
Type:
Event:
Document Year:
Cite

Document Files

ICASSP2016.pdf

(643)

Keywords

Additional Categories

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/898. Accessed: Apr. 24, 2019.
@article{898-16,
url = {http://sigport.org/898},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY},
year = {2016} }
TY - EJOUR
T1 - RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/898
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. IEEE SigPort. http://sigport.org/898
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2016. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY. Available at: http://sigport.org/898.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2016). "RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. RANDOMIZED REQUANTIZATION WITH LOCAL DIFFERENTIAL PRIVACY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/898

COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY

Paper Details

Authors:
Submitted On:
17 March 2016 - 11:53pm
Short Link:
Type:
Event:

Document Files

ICASSP2016.ppt

(352)

Subscribe

[1] , "COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/758. Accessed: Apr. 24, 2019.
@article{758-16,
url = {http://sigport.org/758},
author = { },
publisher = {IEEE SigPort},
title = {COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY},
year = {2016} }
TY - EJOUR
T1 - COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/758
ER -
. (2016). COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY. IEEE SigPort. http://sigport.org/758
, 2016. COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY. Available at: http://sigport.org/758.
. (2016). "COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY." Web.
1. . COMBINING DIRTY-PAPER CODING AND ARTIFICIAL NOISE FOR SECRECY [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/758

Privacy-preserving Nonparametric Decentralized Detection

Paper Details

Authors:
Submitted On:
17 March 2016 - 9:14pm
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

main.pdf

(613)

Subscribe

[1] , "Privacy-preserving Nonparametric Decentralized Detection", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/756. Accessed: Apr. 24, 2019.
@article{756-16,
url = {http://sigport.org/756},
author = { },
publisher = {IEEE SigPort},
title = {Privacy-preserving Nonparametric Decentralized Detection},
year = {2016} }
TY - EJOUR
T1 - Privacy-preserving Nonparametric Decentralized Detection
AU -
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/756
ER -
. (2016). Privacy-preserving Nonparametric Decentralized Detection. IEEE SigPort. http://sigport.org/756
, 2016. Privacy-preserving Nonparametric Decentralized Detection. Available at: http://sigport.org/756.
. (2016). "Privacy-preserving Nonparametric Decentralized Detection." Web.
1. . Privacy-preserving Nonparametric Decentralized Detection [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/756

Conference Poster

Paper Details

Authors:
JOOIM KIM, JIWON YOON
Submitted On:
12 March 2016 - 4:49am
Short Link:
Type:
Event:
Presenter's Name:
Document Year:
Cite

Document Files

icassp2016_주임_new.pdf

(75)

Subscribe

[1] JOOIM KIM, JIWON YOON, "Conference Poster", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/634. Accessed: Apr. 24, 2019.
@article{634-16,
url = {http://sigport.org/634},
author = {JOOIM KIM; JIWON YOON },
publisher = {IEEE SigPort},
title = {Conference Poster},
year = {2016} }
TY - EJOUR
T1 - Conference Poster
AU - JOOIM KIM; JIWON YOON
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/634
ER -
JOOIM KIM, JIWON YOON. (2016). Conference Poster. IEEE SigPort. http://sigport.org/634
JOOIM KIM, JIWON YOON, 2016. Conference Poster. Available at: http://sigport.org/634.
JOOIM KIM, JIWON YOON. (2016). "Conference Poster." Web.
1. JOOIM KIM, JIWON YOON. Conference Poster [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/634

Pages