ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

Secure Computation in a Bidirectional Relay

Kashyap, Navin and Shashank, V and Thangaraj, Andrew (2012) Secure Computation in a Bidirectional Relay. In: IEEE International Symposium on Information Theory, JUL 01-06, 2012 , Cambridge, MA.

[img] PDF
ieee_int_sym_inf_the_pro_2012.pdf - Published Version
Restricted to Registered users only

Download (148kB) | Request a copy
Official URL: http://dx.doi.org/10.1109/ISIT.2012.6283036

Abstract

Bidirectional relaying, where a relay helps two user nodes to exchange equal length binary messages, has been an active area of recent research. A popular strategy involves a modified Gaussian MAC, where the relay decodes the XOR of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes. In this work, we consider the Gaussian MAC in bidirectional relaying with an additional secrecy constraint for protection against a honest but curious relay. The constraint is that, while the relay should decode the XOR, it should be fully ignorant of the individual messages of the users. We exploit the symbol addition that occurs in a Gaussian MAC to design explicit strategies that achieve perfect independence between the received symbols and individual transmitted messages. Our results actually hold for a more general scenario where the messages at the two user nodes come from a finite Abelian group G, and the relay must decode the sum within G of the two messages. We provide a lattice coding strategy and study optimal rate versus average power trade-offs for asymptotically large dimensions.

Item Type: Conference Paper
Series.: IEEE International Symposium on Information Theory
Publisher: IEEE
Additional Information: Copyright for this article belongs to IEEE, NEW YORK
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 07 Feb 2013 11:51
Last Modified: 07 Feb 2013 11:51
URI: http://eprints.iisc.ac.in/id/eprint/45753

Actions (login required)

View Item View Item