Secure Computation in a Bidirectional Relay


Autoria(s): Kashyap, Navin; Shashank, V; Thangaraj, Andrew
Data(s)

2012

Resumo

Bidirectional relaying, where a relay helps two user nodes to exchange equal length binary messages, has been an active area of recent research. A popular strategy involves a modified Gaussian MAC, where the relay decodes the XOR of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes. In this work, we consider the Gaussian MAC in bidirectional relaying with an additional secrecy constraint for protection against a honest but curious relay. The constraint is that, while the relay should decode the XOR, it should be fully ignorant of the individual messages of the users. We exploit the symbol addition that occurs in a Gaussian MAC to design explicit strategies that achieve perfect independence between the received symbols and individual transmitted messages. Our results actually hold for a more general scenario where the messages at the two user nodes come from a finite Abelian group G, and the relay must decode the sum within G of the two messages. We provide a lattice coding strategy and study optimal rate versus average power trade-offs for asymptotically large dimensions.

Formato

application/pdf

Identificador

http://eprints.iisc.ernet.in/45753/1/ieee_int_sym_inf_the_pro_2012.pdf

Kashyap, Navin and Shashank, V and Thangaraj, Andrew (2012) Secure Computation in a Bidirectional Relay. In: IEEE International Symposium on Information Theory, JUL 01-06, 2012 , Cambridge, MA.

Publicador

IEEE

Relação

http://dx.doi.org/10.1109/ISIT.2012.6283036

http://eprints.iisc.ernet.in/45753/

Palavras-Chave #Electrical Communication Engineering
Tipo

Conference Paper

PeerReviewed