Providing secrecy with lattice codes

Xiang He, Aylin Yener

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations

    Abstract

    Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, we provide a tool to bridge these two areas so that the secrecy rate can be computed when lattice codes are used. In particular, we address the problem of bounding equivocation rates under nonlinear modulus operation that is present in lattice encoders/decoders. The technique is then demonstrated in two Gaussian channel examples: (1) a Gaussian wiretap channel with a cooperative jammer, and (2) a multi-hop line network from a source to a destination with untrusted intermediate relay nodes from whom the information needs to be kept secret. In both cases, lattice codes are used to facilitate cooperative jamming. In the second case, interestingly, we demonstrate that a non-vanishing positive secrecy rate is achievable regardless of the number of hops.

    Original languageEnglish (US)
    Title of host publication46th Annual Allerton Conference on Communication, Control, and Computing
    Pages1199-1206
    Number of pages8
    DOIs
    StatePublished - 2008
    Event46th Annual Allerton Conference on Communication, Control, and Computing - Monticello, IL, United States
    Duration: Sep 24 2008Sep 26 2008

    Publication series

    Name46th Annual Allerton Conference on Communication, Control, and Computing

    Other

    Other46th Annual Allerton Conference on Communication, Control, and Computing
    CountryUnited States
    CityMonticello, IL
    Period9/24/089/26/08

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Software
    • Control and Systems Engineering
    • Communication

    Fingerprint Dive into the research topics of 'Providing secrecy with lattice codes'. Together they form a unique fingerprint.

    Cite this