Skip to main content

Showing 1–38 of 38 results for author: D'Oliveira, R G L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.02499  [pdf, other

    cs.CR cs.IT

    An Efficient Hybrid Key Exchange Mechanism

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: We present \textsc{CHOKE}, a novel code-based hybrid key-encapsulation mechanism (KEM) designed to securely and efficiently transmit multiple session keys simultaneously. By encoding $n$ independent session keys with an individually secure linear code and encapsulating each resulting coded symbol using a separate KEM, \textsc{CHOKE} achieves computational individual security -- each key remains se… ▽ More

    Submitted 5 May, 2025; originally announced May 2025.

    Comments: 7 pages, 2 figures

  2. arXiv:2502.02774  [pdf, other

    cs.IT cs.CR

    Optimal Computational Secret Sharing

    Authors: Igor L. Aureliano, Alejandro Cohen, Rafael G. L. D'Oliveira

    Abstract: In $(t, n)$-threshold secret sharing, a secret $S$ is distributed among $n$ participants such that any subset of size $t$ can recover $S$, while any subset of size $t-1$ or fewer learns nothing about it. For information-theoretic secret sharing, it is known that the share size must be at least as large as the secret, i.e., $|S|$. When computational security is employed using cryptographic encrypti… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  3. arXiv:2501.15076  [pdf, other

    cs.CR cs.IT cs.LG

    Cryptanalysis via Machine Learning Based Information Theoretic Metrics

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Muriel Médard

    Abstract: The fields of machine learning (ML) and cryptanalysis share an interestingly common objective of creating a function, based on a given set of inputs and outputs. However, the approaches and methods in doing so vary vastly between the two fields. In this paper, we explore integrating the knowledge from the ML domain to provide empirical evaluations of cryptosystems. Particularly, we utilize informa… ▽ More

    Submitted 24 January, 2025; originally announced January 2025.

  4. arXiv:2405.06773  [pdf, ps, other

    cs.IT

    A Monotone Circuit Construction for Individually-Secure Multi-Secret Sharing

    Authors: Cailyn Bass, Alejandro Cohen, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: In this work, we introduce a new technique for taking a single-secret sharing scheme with a general access structure and transforming it into an individually secure multi-secret sharing scheme where every secret has the same general access structure. To increase the information rate, we consider Individual Security which guarantees zero mutual information with each secret individually, for any una… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

  5. arXiv:2405.06121  [pdf, ps, other

    cs.IT

    Secure Distributed Matrix Multiplication with Precomputation

    Authors: Ryann Cartor, Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk, Alex Sprintson

    Abstract: We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We show how to construct polynomial schemes for the outer product partitioning which take advantage of the user's ability to precompute, and provide bounds for our technique. We show that precomputation allows for a red… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  6. arXiv:2405.05107  [pdf, other

    cs.ET cs.AR eess.SY

    Leveraging AES Padding: dBs for Nothing and FEC for Free in IoT Systems

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin D. Kim, Rafael G. L. D'Oliveira, Alejandro Cohen, Thomas Stahlbuhk, Ken R. Duffy, Muriel Médard

    Abstract: The Internet of Things (IoT) represents a significant advancement in digital technology, with its rapidly growing network of interconnected devices. This expansion, however, brings forth critical challenges in data security and reliability, especially under the threat of increasing cyber vulnerabilities. Addressing the security concerns, the Advanced Encryption Standard (AES) is commonly employed… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  7. arXiv:2405.01495  [pdf, other

    cs.IT cs.CR

    Error Correction Capabilities of Non-Linear Cryptographic Hash Functions

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira

    Abstract: Linear hashes are known to possess error-correcting capabilities. However, in most applications, non-linear hashes with pseudorandom outputs are utilized instead. It has also been established that classical non-systematic random codes, both linear and non-linear, are capacity achieving in the asymptotic regime. Thus, it is reasonable to expect that non-linear hashes might also exhibit good error-c… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  8. arXiv:2310.20486  [pdf, ps, other

    cs.IT

    Optimal Binary Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: We present the notion of \emph{reasonable utility} for binary mechanisms, which applies to all utility functions in the literature. This notion induces a partial ordering on the performance of all binary differentially private (DP) mechanisms. DP mechanisms that are maximal elements of this ordering are optimal DP mechanisms for every reasonable utility. By looking at differential privacy as a ran… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

  9. arXiv:2309.08019  [pdf, other

    cs.CR cs.IT cs.LG

    CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation

    Authors: Benjamin D. Kim, Vipindev Adat Vasudevan, Jongchan Woo, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography… ▽ More

    Submitted 18 September, 2023; v1 submitted 14 September, 2023; originally announced September 2023.

  10. arXiv:2309.05871  [pdf, other

    cs.CR cs.IR cs.IT

    Generalized Rainbow Differential Privacy

    Authors: Yuzhou Gu, Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Parastoo Sadeghi, Muriel Médard, Rafael F. Schaefer

    Abstract: We study a new framework for designing differentially private (DP) mechanisms via randomized graph colorings, called rainbow differential privacy. In this framework, datasets are nodes in a graph, and two neighboring datasets are connected by an edge. Each dataset in the graph has a preferential ordering for the possible outputs of the mechanism, and these orderings are called rainbows. Different… ▽ More

    Submitted 5 April, 2024; v1 submitted 11 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.03974

  11. arXiv:2308.05063  [pdf, other

    cs.CR cs.AR cs.IT eess.SY

    CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green$

    Authors: Jongchan Woo, Vipindev Adat Vasudevan, Benjamin Kim, Alejandro Cohen, Rafael G. L. D'Oliveira, Thomas Stahlbuhk, Muriel Médard

    Abstract: This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction with network coding to provide both information-theoretic and computational security while reducing energy consumption per bit. This paper introduces the hardware architecture for the system and explores various optimizations to en… ▽ More

    Submitted 9 August, 2023; originally announced August 2023.

  12. arXiv:2308.00540  [pdf, other

    cs.CR

    Compressed Private Aggregation for Scalable and Robust Federated Learning over Massive Networks

    Authors: Natalie Lang, Nir Shlezinger, Rafael G. L. D'Oliveira, Salim El Rouayheb

    Abstract: Federated learning (FL) is an emerging paradigm that allows a central server to train machine learning models using remote users' data. Despite its growing popularity, FL faces challenges in preserving the privacy of local datasets, its sensitivity to poisoning attacks by malicious users, and its communication overhead. The latter is additionally considerably dominant in large-scale networks. Thes… ▽ More

    Submitted 8 May, 2025; v1 submitted 1 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: text overlap with arXiv:2208.10888

  13. arXiv:2305.03850  [pdf, other

    cs.IT

    A Non-Asymptotic Analysis of Mismatched Guesswork

    Authors: Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: The problem of mismatched guesswork considers the additional cost incurred by using a guessing function which is optimal for a distribution $q$ when the random variable to be guessed is actually distributed according to a different distribution $p$. This problem has been well-studied from an asymptotic perspective, but there has been little work on quantifying the difference in guesswork between o… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

    Comments: 7 pages, 1 figure. Accepted to ISIT 2023

  14. arXiv:2304.00047  [pdf, other

    cs.LG cs.CR cs.IT

    PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

    Authors: Homa Esfahanizadeh, Adam Yala, Rafael G. L. D'Oliveira, Andrea J. D. Jaba, Victor Quach, Ken R. Duffy, Tommi S. Jaakkola, Vinod Vaikuntanathan, Manya Ghobadi, Regina Barzilay, Muriel Médard

    Abstract: Allowing organizations to share their data for training of machine learning (ML) models without unintended information leakage is an open problem in practice. A promising technique for this still-open problem is to train models on the encoded data. Our approach, called Privately Encoded Open Datasets with Public Labels (PEOPL), uses a certain class of randomly constructed transforms to encode sens… ▽ More

    Submitted 31 March, 2023; originally announced April 2023.

    Comments: Submitted to IEEE Transactions on Information Forensics and Security

  15. arXiv:2208.05907  [pdf, other

    cs.IT cs.CR

    Absolute Security in High-Frequency Wireless Links

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Chia-Yi Yeh, Hichem Guerboukha, Rabi Shrestha, Zhaoji Fang, Edward Knightly, Muriel Médard, Daniel M. Mittleman

    Abstract: Security against eavesdropping is one of the key concerns in the design of any communication system. Many common considerations of the security of a wireless communication channel rely on comparing the signal level measured by Bob (the intended receiver) to that accessible to Eve (an eavesdropper). Frameworks such as Wyner's wiretap model ensure the security of a link, in an average sense, when Bo… ▽ More

    Submitted 11 August, 2022; originally announced August 2022.

  16. arXiv:2208.04977  [pdf, other

    cs.IT

    A Bivariate Invariance Principle

    Authors: Alexander Mariona, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Muriel Médard

    Abstract: A notable result from analysis of Boolean functions is the Basic Invariance Principle (BIP), a quantitative nonlinear generalization of the Central Limit Theorem for multilinear polynomials. We present a generalization of the BIP for bivariate multilinear polynomials, i.e., polynomials over two n-length sequences of random variables. This bivariate invariance principle arises from an iterative app… ▽ More

    Submitted 17 August, 2022; v1 submitted 9 August, 2022; originally announced August 2022.

    Comments: Accepted for presentation at ITW 2022

  17. arXiv:2205.15831  [pdf, other

    cs.IT eess.SP

    Wideband Time Frequency Coding

    Authors: Kathleen Yang, Salman Salamatian, Rafael G. L . D'Oliveira, Muriel Medard

    Abstract: In the wideband regime, the performance of many of the popular modulation schemes such as code division multiple access and orthogonal frequency division multiplexing falls quickly without channel state information. Obtaining the amount of channel information required for these techniques to work is costly and difficult, which suggests the need for schemes which can perform well without channel st… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  18. arXiv:2203.15429  [pdf, ps, other

    cs.DS cs.IT

    Heterogeneous Differential Privacy via Graphs

    Authors: Sahel Torkamani, Javad B. Ebrahimi, Parastoo Sadeghi, Rafael G. L. D'Oliveira, Muriel Medard

    Abstract: We generalize a previous framework for designing utility-optimal differentially private (DP) mechanisms via graphs, where datasets are vertices in the graph and edges represent dataset neighborhood. The boundary set contains datasets where an individual's response changes the binary-valued query compared to its neighbors. Previous work was limited to the homogeneous case where the privacy paramete… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  19. arXiv:2203.12047  [pdf, other

    cs.IT cs.CR

    AES as Error Correction: Cryptosystems for Reliable Communication

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard

    Abstract: In this paper, we show that the Advanced Encryption Standard (AES) cryptosystem can be used as an error-correcting code to obtain reliability over noisy communication and data systems. Moreover, we characterize a family of computational cryptosystems that can potentially be used as well performing error correcting codes. In particular, we show that simple padding followed by a cryptosystem with un… ▽ More

    Submitted 9 September, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

  20. arXiv:2202.03974  [pdf, other

    cs.CR cs.IR cs.IT cs.LG

    Rainbow Differential Privacy

    Authors: Ziqi Zhou, Onur Günlü, Rafael G. L. D'Oliveira, Muriel Médard, Parastoo Sadeghi, Rafael F. Schaefer

    Abstract: We extend a previous framework for designing differentially private (DP) mechanisms via randomized graph colorings that was restricted to binary functions, corresponding to colorings in a graph, to multi-valued functions. As before, datasets are nodes in the graph and any two neighboring datasets are connected by an edge. In our setting, we assume that each dataset has a preferential ordering for… ▽ More

    Submitted 13 May, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: To appear in the 2022 IEEE International Symposium on Information Theory

  21. arXiv:2202.03002  [pdf, other

    cs.IT cs.CR

    Partial Encryption after Encoding for Security and Reliability in Data Systems

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard

    Abstract: We consider the problem of secure and reliable communication over a noisy multipath network. Previous work considering a noiseless version of our problem proposed a hybrid universal network coding cryptosystem (HUNCC). By combining an information-theoretically secure encoder together with partial encryption, HUNCC is able to obtain security guarantees, even in the presence of an all-observing eave… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  22. arXiv:2201.12406  [pdf, other

    cs.LG cs.CR cs.CV

    Syfer: Neural Obfuscation for Private Data Release

    Authors: Adam Yala, Victor Quach, Homa Esfahanizadeh, Rafael G. L. D'Oliveira, Ken R. Duffy, Muriel Médard, Tommi S. Jaakkola, Regina Barzilay

    Abstract: Balancing privacy and predictive utility remains a central challenge for machine learning in healthcare. In this paper, we develop Syfer, a neural obfuscation method to protect against re-identification attacks. Syfer composes trained layers with random neural networks to encode the original data (e.g. X-rays) while maintaining the ability to predict diagnoses from the encoded data. The randomness… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

  23. Field Trace Polynomial Codes for Secure Distributed Matrix Multiplication

    Authors: Roberto Assis Machado, Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein

    Abstract: We consider the problem of communication efficient secure distributed matrix multiplication. The previous literature has focused on reducing the number of servers as a proxy for minimizing communication costs. The intuition being, that the more servers used, the higher the communication cost. We show that this is not the case. Our central technique relies on adapting results from the literature on… ▽ More

    Submitted 9 June, 2022; v1 submitted 19 August, 2021; originally announced August 2021.

    Journal ref: 2021 XVII International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY)

  24. arXiv:2108.06409  [pdf, other

    cs.IT

    Post-Quantum Security for Ultra-Reliable Low-Latency Heterogeneous Networks

    Authors: Rafael G. L. D'Oliveira, Alejandro Cohen, John Robinson, Thomas Stahlbuhk, Muriel Médard

    Abstract: We consider the problem of post-quantum secure and ultra-reliable communication through a heterogeneous network consisting of multiple connections. Three performance metrics are considered: security, throughput, and in-order delivery delay. In this setting, previous work has looked, individually, at the trade-offs between in-order delivery delay and throughput, and between security and throughput.… ▽ More

    Submitted 13 August, 2021; originally announced August 2021.

  25. arXiv:2106.09816  [pdf, ps, other

    cs.IT

    Degree Tables for Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a recently introduced combinatorial tool called the degree table. For a fixed partitioning, minimizing the total communication cost of a polynomial code for SDMM… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  26. arXiv:2106.04467  [pdf, ps, other

    cs.IT

    Private Multi-Group Aggregation

    Authors: Carolina Naim, Rafael G. L. D'Oliveira, Salim El Rouayheb

    Abstract: We study the differentially private multi group aggregation (PMGA) problem. This setting involves a single server and $n$ users. Each user belongs to one of $k$ distinct groups and holds a discrete value. The goal is to design schemes that allow the server to find the aggregate (sum) of the values in each group (with high accuracy) under communication and local differential privacy constraints. Th… ▽ More

    Submitted 8 June, 2021; originally announced June 2021.

    Comments: Short video explaining part of the results: https://youtu.be/yMq6e7E4sE4

  27. arXiv:2102.05172  [pdf, ps, other

    cs.IT

    Differential Privacy for Binary Functions via Randomized Graph Colorings

    Authors: Rafael G. L. D'Oliveira, Muriel Medard, Parastoo Sadeghi

    Abstract: We present a framework for designing differentially private (DP) mechanisms for binary functions via a graph representation of datasets. Datasets are nodes in the graph and any two neighboring datasets are connected by an edge. The true binary function we want to approximate assigns a value (or true color) to a dataset. Randomized DP mechanisms are then equivalent to randomized colorings of the gr… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE ISIT 2021

  28. arXiv:2009.01931  [pdf, other

    cs.IT cs.CR

    Network Coding-Based Post-Quantum Cryptography

    Authors: Alejandro Cohen, Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Medard

    Abstract: We propose a novel hybrid universal network-coding cryptosystem (HUNCC) to obtain secure post-quantum cryptography at high communication rates. The secure network-coding scheme we offer is hybrid in the sense that it combines information-theory security with public-key cryptography. In addition, the scheme is general and can be applied to any communication network, and to any public-key cryptosyst… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

  29. arXiv:2008.09702  [pdf, ps, other

    cs.IT cs.CR

    Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of $3 \choose 2$

    Authors: Rafael G. L. D'Oliveira, Salman Salamatian, Muriel Médard, Parastoo Sadeghi

    Abstract: We study the relationship between randomized low influence functions and differentially private mechanisms. Our main aim is to formally determine whether differentially private mechanisms are low influence and whether low influence randomized functions can be differentially private. We show that differential privacy does not necessarily imply low influence in a formal sense. However, low influence… ▽ More

    Submitted 7 February, 2021; v1 submitted 21 August, 2020; originally announced August 2020.

  30. arXiv:2001.05568  [pdf, other

    cs.IT

    Notes on Communication and Computation in Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. In this paper, we answer the following question: Is it beneficial to offload the computations if security is a concern? We answer this question in the affirmative by showing that by adjusting the parameters in a polynom… ▽ More

    Submitted 8 May, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

  31. arXiv:1912.04977  [pdf, other

    cs.LG cs.CR stat.ML

    Advances and Open Problems in Federated Learning

    Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson , et al. (34 additional authors not shown)

    Abstract: Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while keeping the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re… ▽ More

    Submitted 8 March, 2021; v1 submitted 10 December, 2019; originally announced December 2019.

    Comments: Published in Foundations and Trends in Machine Learning Vol 4 Issue 1. See: https://www.nowpublishers.com/article/Details/MAL-083

  32. arXiv:1812.09962  [pdf, other

    cs.IT

    GASP Codes for Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a combinatorial problem on a special type of addition table, which we call the degree table. The codes are based on arithmetic progressions, and are thus named G… ▽ More

    Submitted 11 February, 2020; v1 submitted 24 December, 2018; originally announced December 2018.

  33. arXiv:1810.05719  [pdf, ps, other

    cs.IT

    One-Shot PIR: Refinement and Lifting

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb

    Abstract: We study a class of private information retrieval (PIR) methods that we call one-shot schemes. The intuition behind one-shot schemes is the following. The user's query is regarded as a dot product of a query vector and the message vector (database) stored at multiple servers. Privacy, in an information theoretic sense, is then achieved by encrypting the query vector using a secure linear code, s… ▽ More

    Submitted 12 October, 2018; originally announced October 2018.

    Comments: A part of this was presented at the IEEE International Symposium on Information Theory 2018

  34. arXiv:1808.05647  [pdf, ps, other

    cs.IT

    The Computational Wiretap Channel

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, Muriel Médard

    Abstract: We present the computational wiretap channel: Alice has some data x and wants to share some computation h(x) with Bob. To do this, she sends f(x), where f is some sufficient statistic for h. An eavesdropper, Eve, is interested in computing another function g(x). We show that, under some conditions on f and g, this channel can be approximated, from Eve's point of view, by the classic Wyner wiretap… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

    Comments: Presented at the 56th Annual Allerton Conference on Communication, Control, and Computing

  35. arXiv:1802.06443  [pdf, other

    cs.IT

    Lifting Private Information Retrieval from Two to any Number of Messages

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb

    Abstract: We study private information retrieval (PIR) on coded data with possibly colluding servers. Devising PIR schemes with optimal download rate in the case of collusion and coded data is still open in general. We provide a lifting operation that can transform what we call one-shot PIR schemes for two messages into schemes for any number of messages. We apply this lifting operation on existing PIR sche… ▽ More

    Submitted 29 May, 2018; v1 submitted 18 February, 2018; originally announced February 2018.

    Comments: presented at ISIT 2018

  36. arXiv:1802.02049  [pdf, other

    cs.IT

    A Distance Between Channels: the average error of mismatched channels

    Authors: Rafael G. L. D'Oliveira, Marcelo Firer

    Abstract: Two channels are equivalent if their maximum likelihood (ML) decoders coincide for every code. We show that this equivalence relation partitions the space of channels into a generalized hyperplane arrangement. With this, we define a coding distance between channels in terms of their ML-decoders which is meaningful from the decoding point of view, in the sense that the closer two channels are, the… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    MSC Class: 68P30; 1E22; 52C35

  37. arXiv:1510.03104  [pdf, other

    cs.IT math.CO

    Channel Metrization

    Authors: Rafael G. L. D'Oliveira, Marcelo Firer

    Abstract: We present an algorithm that, given a channel, determines if there is a distance for it such that the maximum likelihood decoder coincides with the minimum distance decoder. We also show that any metric, up to a decoding equivalence, can be isometrically embedded into the hypercube with the Hamming metric, and thus, in terms of decoding, the Hamming metric is universal.

    Submitted 25 February, 2016; v1 submitted 11 October, 2015; originally announced October 2015.

    Comments: 17 pages, 3 figures, presented shorter version at WCC 2015

  38. arXiv:1301.5915  [pdf, other

    cs.IT math.CO

    The Packing Radius of a Code and Partitioning Problems: the Case for Poset Metrics

    Authors: Rafael Gregorio Lucas D'Oliveira, Marcelo Firer

    Abstract: Until this work, the packing radius of a poset code was only known in the cases where the poset was a chain, a hierarchy, a union of disjoint chains of the same size, and for some families of codes. Our objective is to approach the general case of any poset. To do this, we will divide the problem into two parts. The first part consists in finding the packing radius of a single vector. We will sh… ▽ More

    Submitted 24 January, 2013; originally announced January 2013.