Skip to main content

Showing 1–50 of 62 results for author: Bloch, M

  1. arXiv:2404.09922  [pdf, other

    cs.IT

    Pilot-Attacks Can Enable Positive-Rate Covert Communications of Wireless Hardware Trojans

    Authors: Serhat Bakirtas, Matthieu R. Bloch, Elza Erkip

    Abstract: Hardware Trojans can inflict harm on wireless networks by exploiting the link margins inherent in communication systems. We investigate a setting in which, alongside a legitimate communication link, a hardware Trojan embedded in the legitimate transmitter attempts to establish communication with its intended rogue receiver. To illustrate the susceptibility of wireless networks against pilot attack… ▽ More

    Submitted 23 April, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

  2. arXiv:2311.12176  [pdf, ps, other

    cs.IT

    Covert Online Decision Making: From Sequential Hypothesis Testing to Stochastic Bandits

    Authors: Meng-Che Chang, Matthieu R. Bloch

    Abstract: We study the problem of covert online decision-making in which an agent attempts to identify a parameter governing a system by probing the system while escaping detection from an adversary. The system is modeled as a Markov kernel whose input is controlled by the agent and whose two outputs are observed by the agent and the adversary, respectively. This problem is motivated by applications such as… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  3. arXiv:2303.11350  [pdf, other

    cs.IT cs.CR eess.SP eess.SY

    Secure Integrated Sensing and Communication

    Authors: Onur Günlü, Matthieu R. Bloch, Rafael F. Schaefer, Aylin Yener

    Abstract: This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.10790

  4. arXiv:2210.15764  [pdf, other

    cs.LG cond-mat.dis-nn cond-mat.stat-mech cs.AI stat.ML

    Noise Injection Node Regularization for Robust Learning

    Authors: Noam Levi, Itay M. Bloch, Marat Freytsis, Tomer Volansky

    Abstract: We introduce Noise Injection Node Regularization (NINR), a method of injecting structured noise into Deep Neural Networks (DNN) during the training stage, resulting in an emergent regularizing effect. We present theoretical and empirical evidence for substantial improvement in robustness against various test data perturbations for feed-forward DNNs when trained under NINR. The novelty in our appro… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: 16 pages, 9 figures

    Journal ref: Proceedings of the International Conference on Learning Representations (ICLR), 2023

  5. Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States

    Authors: Meng-Che Chang, Shi-Yuan Wang, Tuna Erdoğan, Matthieu R. Bloch

    Abstract: We study the information-theoretic limits of joint communication and sensing when the sensing task is modeled as the estimation of a discrete channel state fixed during the transmission of an entire codeword. This setting captures scenarios in which the time scale over which sensing happens is significantly slower than the time scale over which symbol transmission occurs. The tradeoff between comm… ▽ More

    Submitted 16 May, 2023; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: 34 pages, 5 figures, accepted to JSAIT

  6. arXiv:2206.10443  [pdf, ps, other

    cs.IT

    Optimal rate-limited secret key generation from Gaussian sources using lattices

    Authors: Laura Luzzi, Cong Ling, Matthieu R. Bloch

    Abstract: We propose a lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves the strong secret key capacity in the case of degraded source models, as well as the optimal secret key / public communication rate trade-off. The key ingredients of our scheme are the use of the modulo lattice operation to extract the channel intrinsic ra… ▽ More

    Submitted 12 April, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: 17 pages, 3 figures, accepted for publication in IEEE Trans. Inf. Theory

  7. arXiv:2202.10790  [pdf, ps, other

    cs.IT cs.CR cs.IR eess.SP

    Secure Joint Communication and Sensing

    Authors: Onur Günlü, Matthieu Bloch, Rafael F. Schaefer, Aylin Yener

    Abstract: This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers… ▽ More

    Submitted 15 August, 2022; v1 submitted 22 February, 2022; originally announced February 2022.

    Comments: Shorter version to appear in the 2022 IEEE International Symposium on Information Theory

  8. arXiv:2106.09485  [pdf, other

    cs.IT cs.CR cs.DC cs.LG eess.SP

    Secure Multi-Function Computation with Private Remote Sources

    Authors: Onur Günlü, Matthieu Bloch, Rafael F. Schaefer

    Abstract: We consider a distributed function computation problem in which parties observing noisy versions of a remote source facilitate the computation of a function of their observations at a fusion center through public communication. The distributed function computation is subject to constraints, including not only reliability and storage but also privacy and secrecy. Specifically, 1) the remote source… ▽ More

    Submitted 29 March, 2022; v1 submitted 17 June, 2021; originally announced June 2021.

    Comments: Shorter version appeared in the IEEE International Symposium on Information Theory 2021

  9. arXiv:2105.04033  [pdf, other

    quant-ph cs.IT

    Key Assistance, Key Agreement, and Layered Secrecy for Bosonic Broadcast Channels

    Authors: Uzi Pereg, Roberto Ferrara, Matthieu R. Bloch

    Abstract: Secret-sharing building blocks based on quantum broadcast communication are studied. The confidential capacity region of the pure-loss bosonic broadcast channel is determined, both with and without key assistance, and an achievable region is established for the lossy bosonic broadcast channel. If the main receiver has a transmissivity of η<1/2, then confidentiality solely relies on the key-assiste… ▽ More

    Submitted 13 September, 2021; v1 submitted 9 May, 2021; originally announced May 2021.

  10. arXiv:2103.00654  [pdf, other

    stat.ML cs.LG

    Feedback Coding for Active Learning

    Authors: Gregory Canal, Matthieu Bloch, Christopher Rozell

    Abstract: The iterative selection of examples for labeling in active machine learning is conceptually similar to feedback channel coding in information theory: in both tasks, the objective is to seek a minimal sequence of actions to encode information in the presence of noise. While this high-level overlap has been previously noted, there remain open questions on how to best formulate active learning as a c… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: AISTATS 2021

  11. Covert MIMO Communications under Variational Distance Constraint

    Authors: Shi-Yuan Wang, Matthieu R. Bloch

    Abstract: The problem of covert communication over Multiple-Input Multiple-Output (MIMO) Additive White Gaussian Noise (AWGN) channels is investigated, in which a transmitter attempts to reliably communicate with a legitimate receiver while avoiding detection by a passive adversary. The covert capacity of the MIMO AWGN is characterized under a variational distance covertness constraint when the MIMO channel… ▽ More

    Submitted 3 September, 2021; v1 submitted 22 February, 2021; originally announced February 2021.

    Comments: 22 pages, 1 figure, accepted to Transactions on Information Forensics & Security

  12. arXiv:2008.01264  [pdf, other

    cs.IT

    On Covert Quantum Sensing and the Benefits of Entanglement

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: Motivated by applications to covert quantum radar, we analyze a covert quantum sensing problem, in which a legitimate user aims at estimating an unknown parameter taking finitely many values by probing a quantum channel while remaining undetectable from an adversary receiving the probing signals through another quantum channel. When channels are classical-quantum, we characterize the optimal error… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  13. arXiv:2003.03308  [pdf, ps, other

    cs.IT

    Keyless Covert Communication via Channel State Information

    Authors: Hassan ZivariFard, Matthieu R. Bloch, Aria Nosratinia

    Abstract: We consider the problem of covert communication over a state-dependent channel when the channel state is available either non-causally, causally, or strictly causally, either at the transmitter alone or at both transmitter and receiver. Covert communication with respect to an adversary, called "warden," is one in which, despite communication over the channel, the warden's observation remains indis… ▽ More

    Submitted 21 May, 2021; v1 submitted 6 March, 2020; originally announced March 2020.

  14. arXiv:2001.01201  [pdf, ps, other

    cs.IT

    Undetectable Radios: Covert Communication under Spectral Mask Constraints

    Authors: Qiaosheng, Zhang, Matthieu R. Bloch, Mayank Bakshi, Sidharth Jaggi

    Abstract: We consider the problem of covert communication over continuous-time additive white Gaussian noise (AWGN) channels under spectral mask constraints, wherein two legitimate parties attempt to communicate reliably in the presence of an eavesdropper that should be unable to estimate if communication takes place. The spectral mask constraint is imposed to restrict excessive radiation beyond the bandwid… ▽ More

    Submitted 5 January, 2020; originally announced January 2020.

  15. arXiv:1907.09602  [pdf, other

    cs.IT quant-ph

    Steganography Protocols for Quantum Channels

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: We study several versions of a quantum steganography problem, in which two legitimate parties attempt to conceal a cypher in a quantum cover transmitted over a quantum channel without arising suspicion from a warden who intercepts the cover. In all our models, we assume that the warden has an inaccurate knowledge of the quantum channel and we formulate several variations of the steganography probl… ▽ More

    Submitted 22 July, 2019; originally announced July 2019.

  16. arXiv:1904.12363  [pdf, other

    cs.IT cs.CR quant-ph

    Toward Undetectable Quantum Key Distribution over Bosonic Channels

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: We show that covert secret key expansion is possible using a public authenticated classical channel and a quantum channel largely under control of an adversary, which we precisely define. We also prove a converse result showing that, under the golden standard of quantum key distribution by which the adversary completely controls the quantum channel, no covert key generation is possible. We propose… ▽ More

    Submitted 8 November, 2019; v1 submitted 28 April, 2019; originally announced April 2019.

  17. arXiv:1902.08657  [pdf, ps, other

    cs.IT

    Two-Multicast Channel with Confidential Messages

    Authors: Hassan ZivariFard, Matthieu Bloch, Aria Nosratinia

    Abstract: Motivated in part by the problem of secure multicast distributed storage, we analyze secrecy rates for a channel in which two transmitters simultaneously multicast to two receivers in the presence of an eavesdropper. Achievable rates are calculated via extensions of a technique due to Chia and El Gamal and the method of output statistics of random binning. Outer bounds are derived for both the deg… ▽ More

    Submitted 3 August, 2020; v1 submitted 22 February, 2019; originally announced February 2019.

  18. Covert Secret Key Generation with an Active Warden

    Authors: Mehrdad Tahmasbi, Matthieu Bloch

    Abstract: We investigate the problem of covert and secret key generation over a state-dependent discrete memoryless channel with one-way public discussion in which an adversary, the warden, may arbitrarily choose the channel state. We develop an adaptive protocol that, under conditions that we explicitly specify, not only allows the transmitter and the legitimate receiver to exchange a secret key but also c… ▽ More

    Submitted 8 November, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Journal ref: in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1026-1039, 2020

  19. arXiv:1812.07026  [pdf, ps, other

    cs.IT

    State Leakage and Coordination with Causal State Knowledge at the Encoder

    Authors: Mael Le Treust, Matthieu Bloch

    Abstract: We revisit the problems of state masking and state amplification through the lens of empirical coordination. Specifically, we characterize the rate-equivocation-coordination trade-offs regions of a state-dependent channel in which the encoder has causal and strictly causal state knowledge. We also extend this characterization to the cases of two-sided state information and noisy channel feedback.… ▽ More

    Submitted 6 November, 2020; v1 submitted 17 December, 2018; originally announced December 2018.

    Comments: accepted in IEEE Transactions on Information Theory

  20. arXiv:1811.11649  [pdf, ps, other

    cs.IT

    Cooperative Resolvability and Secrecy in the Cribbing Multiple-Access Channel

    Authors: Noha Helal, Matthieu Bloch, Aria Nosratinia

    Abstract: We study channel resolvability for the discrete memoryless multiple-access channel with cribbing, i.e., the characterization of the amount of randomness required at the inputs to approximately produce a chosen i.i.d. output distribution according to KL divergence. We analyze resolvability rates when one encoder cribs (i) the input of the other encoder; or the output of the other encoder, (ii) non-… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

  21. arXiv:1811.09695  [pdf, other

    cs.IT

    Multilevel-Coded Pulse-Position Modulation for Covert Communications over Binary-Input Discrete Memoryless Channels

    Authors: Ishaque Ashar Kadampot, Mehrdad Tahmasbi, Matthieu R Bloch

    Abstract: We develop a low-complexity coding scheme to achieve covert communications over binary-input discrete memoryless channels (BI-DMCs). We circumvent the impossibility of covert communication with linear codes by introducing non-linearity through the use of pulse position modulation (PPM) and multilevel coding (MLC). We show that the MLC-PPM scheme exhibits many appealing properties; in particular, t… ▽ More

    Submitted 23 November, 2018; originally announced November 2018.

  22. A framework for covert and secret key expansion over quantum channels

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: Covert and secret quantum key distribution aims at generating information-theoretically secret bits between distant legitimate parties in a manner that remains provably undetectable by an adversary. We propose a framework in which to precisely define and analyze such an operation, and we show that covert and secret key expansion is possible. For fixed and known classical-quantum channels, we devel… ▽ More

    Submitted 24 November, 2018; v1 submitted 13 November, 2018; originally announced November 2018.

    Journal ref: Phys. Rev. A 99, 052329 (2019)

  23. arXiv:1810.07687  [pdf, other

    cs.IT

    Covert Capacity of Non-Coherent Rayleigh-Fading Channels

    Authors: Mehrdad Tahmasbi, Anne Savard, Matthieu R. Bloch

    Abstract: The covert capacity is characterized for a non-coherent fast Rayleigh-fading wireless channel, in which a legitimate user wishes to communicate reliably with a legitimate receiver while escaping detection from a warden. It is shown that the covert capacity is achieved with an amplitude-constrained input distribution that consists of a finite number of mass points including one at zero and numerica… ▽ More

    Submitted 8 November, 2019; v1 submitted 17 October, 2018; originally announced October 2018.

  24. arXiv:1809.10934  [pdf, other

    cs.IT

    Strong Coordination over Noisy Channels with Strictly Causal Encoding

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: We consider a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of strictly causal encoding and non-causal decoding, we prove inner and outer bounds for the strong coordination region and show that the inner bound is achievable with polar codes.

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: 10 pages, 3 figures, conference paper

    Journal ref: Proceedings of Allerton Conference on Communication, Control and Computing 2018

  25. arXiv:1808.09556  [pdf, other

    cs.IT

    Embedding Covert Information in Broadcast Communications

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We analyze a two-receiver binary-input discrete memoryless broadcast channel, in which the transmitter communicates a common message simultaneously to both receivers and a covert message to only one of them. The unintended recipient of the covert message is treated as an adversary who attempts to detect the covert transmission. This model captures the problem of embedding covert messages in an inn… ▽ More

    Submitted 28 August, 2018; originally announced August 2018.

  26. arXiv:1808.05612  [pdf, other

    cs.IT

    Universal Covertness for Discrete Memoryless Sources

    Authors: Remi A. Chou, Matthieu R. Bloch, Aylin Yener

    Abstract: Consider a sequence $X^n$ of length $n$ emitted by a Discrete Memoryless Source (DMS) with unknown distribution $p_X$. The objective is to construct a lossless source code that maps $X^n$ to a sequence $\widehat{Y}^m$ of length $m$ that is indistinguishable, in terms of Kullback-Leibler divergence, from a sequence emitted by another DMS with known distribution $p_Y$. The main result is the existen… ▽ More

    Submitted 17 June, 2021; v1 submitted 16 August, 2018; originally announced August 2018.

    Comments: 11 pages, two-column, 2 figures, accepted to IEEE Transactions on Information Theory

  27. Learning an Adversary's Actions for Secret Communication

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch, Aylin Yener

    Abstract: Secure communication over a wiretap channel is investigated, in which an active adversary modifies the state of the channel and the legitimate transmitter has the opportunity to sense and learn the adversary's actions. The adversary has the ability to switch the channel state and observe the corresponding output at every channel use while the encoder has causal access to observations that depend o… ▽ More

    Submitted 8 November, 2019; v1 submitted 23 July, 2018; originally announced July 2018.

  28. arXiv:1803.06007  [pdf, other

    cs.IT

    Covert Communication over a K-User Multiple Access Channel

    Authors: Keerthi Suria Kumar Arumugam, Matthieu R. Bloch

    Abstract: We consider a scenario in which $K$ transmitters attempt to communicate covert messages reliably to a legitimate receiver over a discrete memoryless MAC while simultaneously escaping detection from an adversary who observes their communication through another discrete memoryless MAC. We assume that each transmitter may use a secret key that is shared only between itself and the legitimate receiver… ▽ More

    Submitted 7 June, 2019; v1 submitted 15 March, 2018; originally announced March 2018.

  29. arXiv:1802.09795  [pdf, other

    cs.IT

    Polar codes for empirical coordination over noisy channels with strictly causal encoding

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: In this paper, we propose a coding scheme based on polar codes for empirical coordination of autonomous devices. We consider a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of strictly causal encoding, we show that polar codes achieve the empirical coordination region, provided that a vanishing ra… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: 4 pages, 1 figure, conference paper presented at XXVIème colloque GRETSI (2017)

  30. Strong coordination of signals and actions over noisy channels with two-sided state information

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu R. Bloch

    Abstract: We consider a network of two nodes separated by a noisy channel with two-sided state information, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme and develop inner and outer bounds for the strong coordination region. While the inner and outer bounds… ▽ More

    Submitted 8 March, 2018; v1 submitted 31 January, 2018; originally announced January 2018.

    Journal ref: IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 66, NO. 8, AUGUST 2020

  31. arXiv:1706.07363  [pdf

    cs.CY

    Smart Wireless Communication is the Cornerstone of Smart Infrastructures

    Authors: Mary Ann Weitnauer, Jennifer Rexford, Nicholas Laneman, Matthieu Bloch, Santiago Griljava, Catherine Ross, Gee-Kung Chang

    Abstract: Emerging smart infrastructures, such as Smart City, Smart Grid, Smart Health, and Smart Transportation, need smart wireless connectivity. However, the requirements of these smart infrastructures cannot be met with today's wireless networks. A new wireless infrastructure is needed to meet unprecedented needs in terms of agility, reliability, security, scalability, and partnerships. We are at the… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.

    Comments: A Computing Community Consortium (CCC) white paper, 5 pages

  32. arXiv:1705.05587  [pdf, other

    cs.IT

    Strong Coordination of Signals and Actions over Noisy Channels

    Authors: Giulia Cervia, Laura Luzzi, Maël Le Treust, Matthieu Bloch

    Abstract: -We develop a random binning scheme for strong coordination in a network of two nodes separated by a noisy channel, in which the input and output signals have to be coordinated with the source and its reconstruction. In the case of non-causal encoding and decoding, we propose a joint source-channel coding scheme and develop inner and outer bounds for the strong coordination region. While the set o… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    Journal ref: IEEE International Symposium on Information Theory, Jun 2017, Aachen, Germany

  33. First and Second Order Asymptotics in Covert Communication

    Authors: Mehrdad Tahmasbi, Matthieu R. Bloch

    Abstract: We study the first- and second-order asymptotics of covert communication over binary-input DMC for three different covertness metrics and under maximum probability of error constraint. When covertness is measured in terms of the relative entropy between the channel output distributions induced with and without communication, we characterize the exact first- and second-order asymptotics of the numb… ▽ More

    Submitted 3 July, 2018; v1 submitted 3 March, 2017; originally announced March 2017.

  34. arXiv:1609.06432  [pdf, other

    cs.IT

    Polar Coding for Empirical Coordination of Signals and Actions over Noisy Channels

    Authors: Giulia Cervia, Laura Luzzi, Matthieu Bloch, Maël Le Treust

    Abstract: -We develop a polar coding scheme for empirical coordination in a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of non-causal encoding and decoding, we show that polar codes achieve the best known inner bound for the empirical coordination region, provided that a vanishing rate of common randomnes… ▽ More

    Submitted 21 September, 2016; originally announced September 2016.

    Journal ref: Information Theory Workshop 2016, Sep 2016, Cambridge, United Kingdom

  35. arXiv:1608.08474  [pdf, other

    cs.IT

    Empirical and Strong Coordination via Soft Covering with Polar Codes

    Authors: Remi A. Chou, Matthieu Bloch, Joerg Kliewer

    Abstract: We design polar codes for empirical coordination and strong coordination in two-node networks. Our constructions hinge on the fact that polar codes enable explicit low-complexity schemes for soft covering. We leverage this property to propose explicit and low-complexity coding schemes that achieve the capacity regions of both empirical coordination and strong coordination for sequences of actions… ▽ More

    Submitted 6 June, 2018; v1 submitted 30 August, 2016; originally announced August 2016.

    Comments: 14 pages, two-column, 5 figures, accepted to IEEE Transactions on Information Theory

  36. arXiv:1603.05399  [pdf, other

    cs.IT

    Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel

    Authors: Somayeh Salimi, Matthieu Bloch, Frederic Gabry, Mikael Skoglund, Panos Papadimitratos

    Abstract: This paper considers the problem of pairwise key agreement without public communication between three users connected through a generalized multiple access channel (MAC). While two users control the channel inputs, all three users observe noisy outputs from the channel and each pair of users wishes to agree on a secret key hidden from the remaining user. We first develop a "pre-generated" key-agre… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.

    Comments: 45 pages, 11 figures, Submitted to the IEEE Transactions on Information Theory

  37. Strong Coordination over Multi-hop Line Networks

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: We analyze the problem of strong coordination over a multi-hop line network in which the node initiating the coordination is a terminal network node. We assume that each node has access to a certain amount of randomness that is local to the node, and that the nodes share some common randomness, which are used together with explicit hop-by-hop communication to achieve strong coordination. We derive… ▽ More

    Submitted 8 April, 2016; v1 submitted 29 February, 2016; originally announced February 2016.

    Comments: 35 pages, 9 Figures, 4 Tables. A part of this work were published in the 2015 IEEE Information Theory Workshop, and a part was accepted for publication in the 50th Annual Conference on Information Sciences and Systems

  38. arXiv:1602.06902  [pdf, other

    cs.IT

    Lossy Compression with Near-uniform Encoder Outputs

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: It is well known that lossless compression of a discrete memoryless source with near-uniform encoder output is possible at a rate above its entropy if and only if the encoder is randomized. This work focuses on deriving conditions for near-uniform encoder output(s) in the Wyner-Ziv and the distributed lossy compression problems. We show that in the Wyner-Ziv problem, near-uniform encoder output an… ▽ More

    Submitted 9 July, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: Submitted to the 2016 IEEE International Symposium on Information Theory (11 Pages, 3 Figures)

  39. arXiv:1508.07920  [pdf, other

    cs.IT

    Coding Schemes for Achieving Strong Secrecy at Negligible Cost

    Authors: Remi A. Chou, Badri Vellambi, Matthieu Bloch, Joerg Kliewer

    Abstract: We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the same channel without secrecy constraints. Specifically, we propose and analyze two source-channel coding architectures, in which secrecy is achieved by multiplexing public and confidential messages. In both cases, our main contribution is to s… ▽ More

    Submitted 5 December, 2016; v1 submitted 31 August, 2015; originally announced August 2015.

    Comments: 15 pages, two-column, 5 figures, accepted to IEEE Transactions on Information Theory

  40. Covert Communication over Noisy Channels: A Resolvability Perspective

    Authors: Matthieu R. Bloch

    Abstract: We consider the situation in which a transmitter attempts to communicate reliably over a discrete memoryless channel while simultaneously ensuring covertness (low probability of detection) with respect to a warden, who observes the signals through another discrete memoryless channel. We develop a coding scheme based on the principle of channel resolvability, which generalizes and extends prior wor… ▽ More

    Submitted 28 January, 2016; v1 submitted 30 March, 2015; originally announced March 2015.

    Comments: 30 pages, 4 figures, accepted to IEEE Transactions on Information Theory

  41. arXiv:1501.03685  [pdf, other

    cs.IT math.OC

    Coordination in distributed networks via coded actions with application to power control

    Authors: Benjamin Larrousse, Samson Lasaulce, Matthieu Bloch

    Abstract: This paper investigates the problem of coordinating several agents through their actions. Although the methodology applies to general scenarios, the present work focuses on a situation with an asymmetric observation structure that only involves two agents. More precisely, one of the agents knows the past, present, and future realizations of a state (the system state) that affects the common payoff… ▽ More

    Submitted 14 August, 2017; v1 submitted 15 January, 2015; originally announced January 2015.

    Comments: Submitted to ieee transactions on information theory. Some results partly published in references [1-3]

  42. arXiv:1411.0281  [pdf, other

    cs.IT

    Polar Coding for the Broadcast Channel with Confidential Messages: A Random Binning Analogy

    Authors: Remi A. Chou, Matthieu R. Bloch

    Abstract: We develop a low-complexity polar coding scheme for the discrete memoryless broadcast channel with confidential messages under strong secrecy and randomness constraints. Our scheme extends previous work by using an optimal rate of uniform randomness in the stochastic encoder, and avoiding assumptions regarding the symmetry or degraded nature of the channels. The price paid for these extensions is… ▽ More

    Submitted 4 March, 2016; v1 submitted 2 November, 2014; originally announced November 2014.

    Comments: 20 pages, two-column, 6 figures, accepted to IEEE Transactions on Information Theory; parts of the results were presented at the 2015 IEEE Information Theory Workshop; minor change in title

  43. arXiv:1411.0181  [pdf, other

    cs.RO eess.SY

    Restricted Discrete Invariance and Self-Synchronization For Stable Walking of Bipedal Robots

    Authors: Hamed Razavi, Anthony M. Bloch, Christine Chevallereau, J. W. Grizzle

    Abstract: Models of bipedal locomotion are hybrid, with a continuous component often generated by a Lagrangian plus actuators, and a discrete component where leg transfer takes place. The discrete component typically consists of a locally embedded co-dimension one submanifold in the continuous state space of the robot, called the switching surface, and a reset map that provides a new initial condition when… ▽ More

    Submitted 9 June, 2016; v1 submitted 1 November, 2014; originally announced November 2014.

    Comments: Conference

  44. arXiv:1406.6758  [pdf, ps, other

    cs.IT cs.CR

    Information Spectrum Approach to Strong Converse Theorems for Degraded Wiretap Channels

    Authors: Vincent Y. F. Tan, Matthieu R. Bloch

    Abstract: We consider block codes for degraded wiretap channels in which the legitimate receiver decodes the message with an asymptotic error probability no larger than $\varepsilon$ but the leakage to the eavesdropper vanishes. For discrete memoryless and Gaussian wiretap channels, we show that the maximum rate of transmission does not depend on $\varepsilon\in [0,1)$, i.e., such channels possess the parti… ▽ More

    Submitted 26 September, 2014; v1 submitted 25 June, 2014; originally announced June 2014.

    Comments: Presented at Allerton Conference 2014; Submitted to the IEEE Journal of Selected Topics in Signal Processing; v2 corrected typos and strengthened Theorem 4

  45. arXiv:1312.3304  [pdf, other

    cs.IT

    The Effect of Eavesdropper's Statistics in Experimental Wireless Secret-Key Generation

    Authors: Alexandre J. Pierrot, Rémi A. Chou, Matthieu R. Bloch

    Abstract: This paper investigates the role of the eavesdropper's statistics in the implementation of a practical secret-key generation system. We carefully conduct the information-theoretic analysis of a secret-key generation system from wireless channel gains measured with software-defined radios. In particular, we show that it is inaccurate to assume that the eavesdropper gets no information because of de… ▽ More

    Submitted 17 June, 2014; v1 submitted 11 December, 2013; originally announced December 2013.

    Comments: Submitted to the IEEE Transactions on Information Forensics and Security

  46. arXiv:1306.5299  [pdf, ps, other

    cs.IT

    Secret key generation from Gaussian sources using lattice hashing

    Authors: Cong Ling, Laura Luzzi, Matthieu R. Bloch

    Abstract: We propose a simple yet complete lattice-based scheme for secret key generation from Gaussian sources in the presence of an eavesdropper, and show that it achieves strong secret key rates up to 1/2 nat from the optimal in the case of "degraded" source models. The novel ingredient of our scheme is a lattice-hashing technique, based on the notions of flatness factor and channel intrinsic randomness.… ▽ More

    Submitted 22 June, 2013; originally announced June 2013.

    Comments: 5 pages, Conference (ISIT 2013)

  47. arXiv:1305.5992  [pdf, other

    cs.IT

    Strong Coordination over a Line Network

    Authors: Matthieu R. Bloch, Joerg Kliewer

    Abstract: We study the problem of strong coordination in a three-terminal line network, in which agents use common randomness and communicate over a line network to ensure that their actions follow a prescribed behavior, modeled by a target joint distribution of actions. We provide inner and outer bounds to the coordination capacity region, and show that these bounds are partially optimal. We leverage this… ▽ More

    Submitted 26 May, 2013; originally announced May 2013.

    Comments: To be presented at ISIT 2013, Istanbul, Turkey

  48. arXiv:1305.4746  [pdf, other

    cs.IT

    Polar Coding for Secret-Key Generation

    Authors: Remi A. Chou, Matthieu R. Bloch, Emmanuel Abbe

    Abstract: Practical implementations of secret-key generation are often based on sequential strategies, which handle reliability and secrecy in two successive steps, called reconciliation and privacy amplification. In this paper, we propose an alternative approach based on polar codes that jointly deals with reliability and secrecy. Specifically, we propose secret-key capacity-achieving polar coding schemes… ▽ More

    Submitted 6 August, 2015; v1 submitted 21 May, 2013; originally announced May 2013.

    Comments: 26 pages, 9 figures, accepted to IEEE Transactions on Information Theory; parts of the results were presented at the 2013 IEEE Information Theory Workshop

  49. arXiv:1302.4767  [pdf, ps, other

    cs.IT cs.CR

    Low-power Secret-key Agreement over OFDM

    Authors: Francesco Renna, Nicola Laurenti, Stefano Tomasin, Marco Baldi, Nicola Maturo, Marco Bianchi, Franco Chiaraluce, Matthieu Bloch

    Abstract: Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplif… ▽ More

    Submitted 19 February, 2013; originally announced February 2013.

    Comments: 9 pages, 4 figures; this is the authors prepared version of the paper with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19 April 2013

  50. arXiv:1210.4482  [pdf, other

    cs.IT

    Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation

    Authors: Remi A. Chou, Matthieu R. Bloch

    Abstract: For a discrete or a continuous source model, we study the problem of secret-key generation with one round of rate-limited public communication between two legitimate users. Although we do not provide new bounds on the wiretap secret-key (WSK) capacity for the discrete source model, we use an alternative achievability scheme that may be useful for practical applications. As a side result, we conven… ▽ More

    Submitted 16 May, 2014; v1 submitted 16 October, 2012; originally announced October 2012.

    Comments: 18 pages, two-column, 9 figures, accepted to IEEE Transactions on Information Theory; corrected typos; updated references; minor change in title