Skip to main content

Showing 1–13 of 13 results for author: Budkuley, A J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13608  [pdf, other

    cs.IT cs.CR

    Wiretapped Commitment over Binary Channels

    Authors: Anuj Kumar Yadav, Manideep Mamindlapally, Amitalok J. Budkuley

    Abstract: We propose the problem of wiretapped commitment, where two parties, say committer Alice and receiver Bob, engage in a commitment protocol using a noisy channel as a resource, in the presence of an eavesdropper, say Eve. Noisy versions of Alice's transmission over the wiretap channel are received at both Bob and Eve. We seek to determine the maximum commitment throughput in the presence of an eaves… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 13 Pages, 1 figure

  2. arXiv:2305.07118  [pdf, other

    cs.IT cs.CR

    Commitment over Gaussian Unfair Noisy Channels

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes, however, their imprecise statistical characterization can severely impair such schemes, especially their security guarantees. Keeping our focus on channel unreliability in this work, we study commitment over unreliable con… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: The paper follows alphabetical author order. AKY, MM, and PJ have equally contributed to this work

  3. arXiv:2111.08477  [pdf, other

    cs.IT cs.CR

    On Reverse Elastic Channels and the Asymmetry of Commitment Capacity under Channel Elasticity

    Authors: Amitalok J. Budkuley, Pranav Joshi, Manideep Mamindlapally, Anuj Kumar Yadav

    Abstract: Commitment is an important cryptographic primitive. It is well known that noisy channels are a promising resource to realize commitment in an information-theoretically secure manner. However, oftentimes, channel behaviour may be poorly characterized thereby limiting the commitment throughput and/or degrading the security guarantees; particularly problematic is when a dishonest party, unbeknown to… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 16 pages, 3 figures

  4. arXiv:2009.03788  [pdf, other

    cs.IT cs.CC cs.DM math.CO

    Tight List-Sizes for Oblivious AVCs under Constraints

    Authors: Yihan Zhang, Sidharth Jaggi, Amitalok J. Budkuley

    Abstract: We study list-decoding over adversarial channels governed by oblivious adversaries (a.k.a. oblivious Arbitrarily Varying Channels (AVCs)). This type of adversaries aims to maliciously corrupt the communication without knowing the actual transmission from the sender. For any oblivious AVCs potentially with constraints on the sender's transmitted sequence and the adversary's noise sequence, we deter… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

  5. arXiv:1909.04264  [pdf, other

    cs.IT math.CO math.MG

    Generalized List Decoding

    Authors: Yihan Zhang, Amitalok J. Budkuley, Sidharth Jaggi

    Abstract: This paper concerns itself with the question of list decoding for general adversarial channels, e.g., bit-flip ($\textsf{XOR}$) channels, erasure channels, $\textsf{AND}$ ($Z$-) channels, $\textsf{OR}$ channels, real adder channels, noisy typewriter channels, etc. We precisely characterize when exponential-sized (or positive rate) $(L-1)$-list decodable codes (where the list size $L$ is a universa… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  6. arXiv:1809.04464  [pdf, other

    cs.IT

    Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a two-output noi… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1704.07693

  7. arXiv:1804.10221  [pdf, other

    cs.IT

    Communication over an Arbitrarily Varying Channel under a State-Myopic Encoder

    Authors: Amitalok J. Budkuley, Sidharth Jaggi

    Abstract: We study the problem of communication over a discrete arbitrarily varying channel (AVC) when a noisy version of the state is known non-causally at the encoder. The state is chosen by an adversary which knows the coding scheme. A state-myopic encoder observes this state non-causally, though imperfectly, through a noisy discrete memoryless channel (DMC). We first characterize the capacity of this st… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 16 pages

  8. arXiv:1704.07693  [pdf, other

    cs.IT

    Coding for Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for a memoryless remote source. The source data is broadcast over an arbitrarily varying channel (AVC) controlled by an adversary. One output of the AVC is received as input at the encoder, and another output is received as side information at the decoder. The adversary is assumed to know the source data non-causally, and can employ randomized jamming strateg… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

    Comments: 11 pages

  9. Effect of Jitter on the Settling Time of Mesochronous Clock Retiming Circuits

    Authors: Naveen Kadayinti, Amitalok J. Budkuley, Maryam S. Baghini, Dinesh K. Sharma

    Abstract: It is well known that timing jitter can degrade the bit error rate (BER) of receivers that recover the clock from input data. However, timing jitter can also result in an indefinite increase in the settling time of clock recovery circuits, particularly in low swing mesochronous systems. Mesochronous clock retiming circuits are required in repeaterless low swing on-chip interconnects. We first disc… ▽ More

    Submitted 5 December, 2019; v1 submitted 1 April, 2016; originally announced April 2016.

    Comments: 23 pages, 40 figures

    Journal ref: Analog Integr Circ Sig Process (2019) 101: 623

  10. arXiv:1509.08299  [pdf, other

    cs.IT

    Communication in the Presence of a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication systems over state-dependent channels in the presence of a malicious state-aware jamming adversary. The channel has a memoryless state with an underlying distribution. The adversary introduces a jamming signal into the channel. The state sequence is known non-causally to both the encoder and the adversary. Taking an Arbitrarily Varying Channel (AVC) approach, we consider two… ▽ More

    Submitted 31 August, 2017; v1 submitted 28 September, 2015; originally announced September 2015.

    Comments: 24 pages, 3 figures

  11. arXiv:1504.04351  [pdf, other

    cs.IT

    Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, we take an arbitrarily varying channel (AVC) approach to examine the problem of writing on a dirty paper in the presence of an adversary. We consider an additive white Gaussian noise (AWGN) channel with an additive white Gaussian state, where the state is known non-causally to the encoder and the adversary, but not the decoder. We determine the randomized coding capacity of this AVC… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

  12. arXiv:1404.5060  [pdf, other

    cs.IT

    Writing on a Dirty Paper in the presence of Jamming

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, the problem of writing on a dirty paper in the presence of jamming is examined. We consider an AWGN channel with an additive white Gaussian state and an additive adversarial jammer. The state is assumed to be known non-causally to the encoder and the jammer but not to the decoder. The capacity of the channel in the presence of a jammer is determined. A surprising result that this ca… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

  13. arXiv:1404.5055  [pdf, other

    cs.IT

    Correlated Jamming in a Joint Source Channel Communication System

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study correlated jamming in joint source-channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission. This user-jammer interaction is modeled as a zero sum game. A set of conditions on the source and the channel is provided for the existence of a Nash equilibrium for this ga… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.