CIF

group_project

Visible to the public CIF:Small:Collaborative Research:Security in Dynamic Environments: Harvesting Network Randomness and Diversity

The project aims at quantifying a general network's inner potential for supporting various forms of security by achieving secret common randomness between pairs or groups of its nodes. Statistical and computational secrecy measures are being considered against a general passive adversary. Common-randomness-achieving protocols are classified into two groups: culture-building and crowd-shielding. The former achieves common randomness between nodes situated in close proximity of each other, from correlated observations of specific (natural or induced) network phenomena.

group_project

Visible to the public CIF:Medium:Collaborative Research:Maximal Leakage and Active Receivers for Side- and Covert Channel Analysis

A side-channel is any process that inevitably and unintentionally leaks information to an unauthorized user in a computer or communication system. A covert channel is any mechanism through which two parties simultaneously accessing the same computer intentionally communicate, despite this mechanism being disallowed for communication.

group_project

Visible to the public CIF: Small: Collaborative Research: Secret Key Generation Under Resource Constraints

Common shared keys, which can be used for encryption/decryption, authentication and various other security primitives, plays a fundamental role in securing modern digital systems. Due to such significant importance, there has been a tremendous amount of work on the design of key generation/distribution schemes. Despite of these efforts, significant challenges, such as scalability and availability, remain to be fully addressed. This project investigates information theoretic approaches for secret key generation with focuses on fundamental and challenging issues under more realistic models.

group_project

Visible to the public CIF: Small: Collaborative Research:Towards more Secure Systems: Uniformization for Secrecy

As communication networks play an increasingly vital role in our society, ensuring the confidentiality of information transmission and storage has become an increasing concern. New classes of networks, such as heterogeneous wireless networks and distributed storage networks, are emerging, in which the deployment of off-the-shelf cryptographic solutions faces several limitations.

group_project

Visible to the public CIF: Small: Collaborative Research:Towards more Secure Systems: Uniformization for Secrecy

As communication networks play an increasingly vital role in our society, ensuring the confidentiality of information transmission and storage has become an increasing concern. New classes of networks, such as heterogeneous wireless networks and distributed storage networks, are emerging, in which the deployment of off-the-shelf cryptographic solutions faces several limitations.

group_project

Visible to the public CIF: Small: Alignment for Secrecy: One-Time-Pads in the Air without Keys

Mobile devices, including smartphones and tablets, are becoming extremely prevalent nowadays. Equipped with diverse sensors, from GPS to camera, and paired with the inherent mobility of their owners, mobile devices are capable of acquiring rich information of surrounding environment. However, the wide adoption of mobile crowd sensing is largely hindered by its privacy concerns.

group_project

Visible to the public  CIF: Small: Alignment for Secrecy: One-Time-Pads in the Air without Keys

In today's communication networks, most data flow through wireless links which are particularly vulnerable to eavesdropping attacks. While currently available cryptographic algorithms provide useful protection against computationally limited eavesdroppers, the ever-increasing computational power of adversaries necessitates techniques that provide stronger forms of security guarantees. Information-theoretic physical layer security provides unconditional security guarantees that are valid even against computationally unlimited adversaries.

group_project

Visible to the public CIF: Small: A Framework for Low Latency Universal Compression with Privacy Guarantees

In contrast to the traditional data communications models in which large blocks of data are compressed, the evolving information generation, access, and storage contexts require compressing relatively smaller blocks of data asynchronously and concurrently from a large number of sources, and often, with additional security and privacy constraints. This research addresses this growing need by developing a rigorous framework for universal lossy and lossless compression algorithms in the finite blocklength regime with strong theoretical guarantees.

group_project

Visible to the public  CIF: Small: Statistical Data Privacy: Fundamental Limits and Efficient Algorithms

Privacy is a fundamental individual right. In the era of big data, large amounts of data about individuals are collected both voluntarily (e.g., frequent flier/shopper incentives) and involuntarily (e.g. US Census or medical records).

group_project

Visible to the public CIF: Small: Everlasting Security for Disadvantaged Wireless Communications

This project develops techniques to provide information-theoretic secrecy for messages transmitted in a wireless communication system for the challenging scenario where an eavesdropper receives a stronger signal than the desired recipient: for example, the eavesdropper might be significantly closer to the transmitter than the intended receiver. The approach considered in this project starts with the transmitter and intended receiver sharing an ephemeral cryptographic key, which the transmitter then employs to intentionally distort the transmitted signal.