{"title":"Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes","authors":"M. Baldi, F. Chiaraluce","doi":"10.1109/ISIT.2007.4557609","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557609","url":null,"abstract":"We adopt a class of quasi-cyclic low-density parity-check codes that allow to overcome the main limitations of the original McEliece cryptosystem based on Goppa codes, that are large key size and low transmission rate. The codes are designed by using a new algorithm based on \"random difference families\" that permits to construct very large sets of equivalent codes. An extensive cryptanalysis is developed to verify the security level achievable through a selected choice of the system parameters. While previous versions of the McEliece cryptosystem based on LDPC codes are vulnerable to the considered attacks, a new scheme is proposed that ensures satisfactory system robustness with reduced key size and increased transmission rate. Moreover, it is established that the new cryptosystem can be fast enough to justify its adoption as an alternative to widespread solutions, like RSA.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"52 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122565925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating Distributed Consensus Via Lifting Markov Chains","authors":"Wen J. Li, H. Dai","doi":"10.1109/ISIT.2007.4557655","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557655","url":null,"abstract":"Existing works on distributed averaging explore linear iterations based on reversible Markov chains. The convergence of such algorithms is bounded to be slow due to the diffusive behavior of the reversible chains. It has been observed that certain nonreversible chains lifted from reversible ones mix substantially faster than the original chains. We show that the idea of nonreversible lifting lends itself naturally to a fast distributed averaging algorithm, where each node maintains multiple estimates, corresponding to multiple lifted states in the Markov chain. We give a rigorous proof that it is possible to achieve an e-averaging time of Theta(k log(1/isin)) on a k times k grid. For a general wireless network, we propose a Location-Aided Distributed Averaging (LADA) algorithm, which utilizes local information to construct a fast-mixing nonreversible chain in a distributed manner. We show that using LADA, an e-averaging time of Theta(r-1 log(1/isin)) is achievable in a wireless network with transmission radius r.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Occupancy Distribution of Queueing Systems with Opportunistic Scheduling in the Downlink","authors":"M. Dashouk, M. Alanyali, M. Sharif","doi":"10.1109/ISIT.2007.4557670","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557670","url":null,"abstract":"We consider a block-fading homogeneous broadcast channel with n users each receiving packets randomly and independently with a rate of lambda. Packets are stored in separate queues to await transmission using an opportunistic scheduling which exploits the multiuser diversity of the channel by serving the user with the most favorable channel condition at each coherence interval. In this paper, we consider a stochastic model in which mean packet transmission time is n-1 and establish a convergence result for the occupancy distribution of all n queues under opportunistic scheduling. It is shown that if lambda < 1 then the expected length of the longest queue is less than log1/lambda n + O(1) for large n. In order to improve the occupancy distribution while exploiting the multiuser diversity, we also study a scheme that serves the user with the longest queue among the d users with the most favorable channel conditions. It is shown that upper bound on the expected length of the longest queue improves to logd/lambda n + O(1). Simulation results are presented to validate our asymptotic results.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"477 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122740813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On binary primitive BCH codes with minimum distance 8 and exponential sums","authors":"P. Charpin, T. Helleseth, V. Zinoviev","doi":"10.1109/ISIT.2007.4557155","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557155","url":null,"abstract":"The exact expressions for the number of codewords of weight 4 in the cosets of weight 4 of binary primitive BCH codes of length n = 2m (m even) with minimum distance 8 is given in terms of several exponential sums, including cubic sums and Kloosterman sums. This provides a bound on the number of codewords of weight 4 in the cosets of weight 4 and also some limitations for possible values of Kloosterman sums over GF(2m), (m even).","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122923337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication For Omniscience by a Neutral Observer and Information-Theoretic Key Agreement of Multiple Terminals","authors":"A. Gohari, V. Anantharam","doi":"10.1109/ISIT.2007.4557523","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557523","url":null,"abstract":"We derive a new upper bound on the secrecy capacity in the source model with eavesdropper which strictly improves the currently best upper bound, i.e. the double intrinsic information bound of Renner and Wolf. Furthermore, unlike that bound, which is defined only in the case of two terminals, the new upper bound is not specific to the two terminals case. We define a problem of communication for omniscience by a neutral observer and establish the equivalence between this new problem and the problem of secret key agreement.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern Recognition System Design with Linear Encoding for Discrete Patterns","authors":"Po-Hsiang Lai, J. O’Sullivan","doi":"10.1109/ISIT.2007.4557243","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557243","url":null,"abstract":"Pattern recognition systems based on compressed patterns and compressed sensor measurements can be designed using low-density matrices. We examine truncation encoding where a subset of the patterns and measurements are stored perfrectly while the rest is discarded. We also examine the use of LDPC parity check matrices for compressing measurements and patterns. We show how more general ensembles of good linear codes can be used as the basis for pattern recognition system design, yielding system design strategies for more general noise models.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponential Curvature of Markov Models","authors":"J. Takeuchi, T. Kawabata","doi":"10.1109/ISIT.2007.4557657","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557657","url":null,"abstract":"We prove that the non FSMX tree model is not an exponential family. It is noted in [Weinberger et al., 95] that the tree source is classified into two classes; a FSMX source or not, depending on shape of the context tree. The FSMX source is a tree source and a finite state machine. It is known that the FSMX model is an exponential family. In this situation our concern is whether the non FSMX tree model is an exponential family or not. This paper's contribution is to show that the non FSMX tree model is not an exponential family. Hence, for the tree model, to be an FSMX model is a necessary and sufficient condition for to be an exponential family.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122175125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study on the genetic code: comparison with multiplexed codes","authors":"G. Sicot, R. Pyndiah","doi":"10.1109/ISIT.2007.4557621","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557621","url":null,"abstract":"The genetic code is a key concept in genetics. This code establishes the link between the DNA (desoxyribonucleic acid), composed of nucleic acids, and proteins, composed of amino acids. The genetic code is known to be universal, indeed almost all organisms use this code, and it is degenerated, this means that several sequences of nucleic acids can be translated into the same amino acid. This feature is also present in multiplexed codes which is a new concept recently introduced for robust source coding. In this paper we present a comparison between multiplexed codes and the genetic code. We show why this comparison is relevant, and we point out the fact that the genetic code is almost optimal in the context of multiplexed codes theory.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Reliable Broadcasting using ACKs","authors":"M. Durvy, C. Fragouli, Patrick Thiran","doi":"10.1109/ISIT.2007.4557379","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557379","url":null,"abstract":"We propose a mechanism for reliable broadcasting in wireless networks, that consists of two components: a method for bandwidth efficient acknowledgment collection, and a coding scheme that uses acknowledgments. Our approach combines ideas from network coding and distributed space time coding.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secret Communication with a Fading Eavesdropper Channel","authors":"Zang Li, R. Yates, W. Trappe","doi":"10.1109/ISIT.2007.4557402","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557402","url":null,"abstract":"We investigate the achievable secrecy rate with Gaussian random codes when the main channel is an AWGN channel, while the eavesdropper's channel is Rayleigh fading with additive Gaussian noise. Several transmission strategies according to the main channel's relative channel gain are proposed and evaluated. We show that even if the main channel channel gain is arbitrarily worse than the eavesdropper's average channel gain, positive secrecy rate can still be achieved with artificial noise injection and a burst signaling strategy.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}