Kashyap, Navin and Shashank, V and Thangaraj, Andrew (2012) Secure Computation in a Bidirectional Relay. In: IEEE International Symposium on Information Theory, JUL 01-06, 2012 , Cambridge, MA.
PDF
ieee_int_sym_inf_the_pro_2012.pdf - Published Version Restricted to Registered users only Download (148kB) | Request a copy |
Abstract
Bidirectional relaying, where a relay helps two user nodes to exchange equal length binary messages, has been an active area of recent research. A popular strategy involves a modified Gaussian MAC, where the relay decodes the XOR of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes. In this work, we consider the Gaussian MAC in bidirectional relaying with an additional secrecy constraint for protection against a honest but curious relay. The constraint is that, while the relay should decode the XOR, it should be fully ignorant of the individual messages of the users. We exploit the symbol addition that occurs in a Gaussian MAC to design explicit strategies that achieve perfect independence between the received symbols and individual transmitted messages. Our results actually hold for a more general scenario where the messages at the two user nodes come from a finite Abelian group G, and the relay must decode the sum within G of the two messages. We provide a lattice coding strategy and study optimal rate versus average power trade-offs for asymptotically large dimensions.
Item Type: | Conference Paper |
---|---|
Series.: | IEEE International Symposium on Information Theory |
Publisher: | IEEE |
Additional Information: | Copyright for this article belongs to IEEE, NEW YORK |
Department/Centre: | Division of Electrical Sciences > Electrical Communication Engineering |
Date Deposited: | 07 Feb 2013 11:51 |
Last Modified: | 07 Feb 2013 11:51 |
URI: | http://eprints.iisc.ac.in/id/eprint/45753 |
Actions (login required)
View Item |