On Secret Sharing Schemes based on Regenerating Codes

Size: px
Start display at page:

Download "On Secret Sharing Schemes based on Regenerating Codes"

Transcription

1 On Secret Sharing Schemes base on Regenerating Coes Masazumi Kurihara (University of Electro-Communications) 0 IEICE General Conference Okayama Japan 0- March 0. (Proc. of 0 IEICE General Conference AS-- pp.s7-s8)

2 Data file Distribute Storage System (Secret Sharing Scheme?) Network encoing Data Collector (Reconstruction) Helper noe Helper noe Helper noe Faile noe (Repair the faile noe) (Regeneration)

3 Regenerating Coes A.G.Dimakis P.B.Gofrey Y.Wu M.J.Wainwright K.Ramchanran Network Coing for Distribute Storage Systems IEEE IT Trans. Vol.6 no [Dimakis et al.00] Repair Problem ( --- symmetry --- ) -- Repairing a faile noe -- Regenerating ata that was store in the faile noe

4 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage (The results of Dimakis et al.). Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes)

5 Keywors an their relation Coes for Distribute Storage Reconstruction(Recovery) Erasure coes (MDS coes RS coes etc.) Reconstruction an Regeneration Regenerating coes Network Coing (for multicast non-multicast) Liner network Coing Ranom linear network Coing Secret Sharing MDS-coe-base Secret Sharing Regenerating-coe-base Secret Sharing (Secure Regenerating Coes)

6 Distribute Storage using ( n k ) MDS coes ( n ) MDS coe ( n k ) MDS coe Message (one symbol) Noe Noe Share DC Message ( k symbols) Noe Noe Share k DC Noe k Noe n at most n- faile noes Noe n Traeoff between Reunancy an Reliability at most n-k faile noes Performance metric 6

7 Regenerating Coes Collection of six parameters ( n k α B ) Reconstruction property A ata collector can reconstruct the original ata by using the ata ownloae from any k active noes. Regeneration property A faile noe can regenerate the ata which was store in itself by using the ata ownloae from any active noes. Erasure coes Regenerating coes 7

8 message B= 6 (Message size) Noe u u u 6 encoing Message Encoing an Shares (Share size = storage ) Noe c c Noe Noe Noe Share α= c c c c c c c c ( n k α B ) n= (Total number of noes in a network) 8

9 message B= 6 (message size) u u u u u 6 encoing n= Reconstruction Property( k ) Share α= (Share size = storage ) c c c c c c c c c c ( n k α B ) c c c c c c k= k shares provie is the minimum ata for reconstructing the original message. DC Reconstruction u u u 6 Original message 9

10 Maintaining the reliable istribute storage system (Repair a faile noe i.e. regenerate the share of it) cut Share α= message B= 6 c c u u u 6 c c c c Faile noe c c c c 0

11 Regeneration by reconstruction message B= 6 u u u 6 encoing cut Share α= c c c c c c c c c c c Share c c c c c k= The original message Repair-Banwith kα=x=6(=b) Reconstruction u u u 6 c c encoing

12 message B= 6 u u u 6 encoing Point ( k ) Regeneration Property ( an ) cut Share α= (Share size = storage ) c c c c c c c c c c ( n k α B ) = (piece size ) = Repair-Banwith =x= (<6=B) Repair the faile noe -vector = ( ) = (piece-vector size ) Regeneration Noe c c ( Exact-regeneration )

13 message B= 6 u u u u u 6 encoing cut Share α= (Share size = storage ) c c c c c c c c Why k? If <k then = (piece size ) ( =<=k ) = Repair the faile noes Noe Noe Noe Repair-Banwith x k = x c c c c c c skip c c k shares provie is the minimum ata for reconstructing the message.

14 . Reucing the repair-banwith ( Fixe k an ). Traeoff between Storage α an Repair-Banwith message B u u u 6 encoing cut Share α (Share size = Storage ) c c c c c c c c c c Trae-off (piece size ) Repair-Banwith Repair the faile noe -vector = ( ) (piece-vector size ) Regeneration Noe c c

15 Traeoff between Storage α an Repair-Banwith Banwith to repair one noe / / /9 O Minimum Storage Regenerating(MSR) point (α) point / /8 /9 Storage per noe α ( B= k= = ) Minimum Banwith Regenerating(MBR) point α

16 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 6

17 (Linear) Network Coing for multicast t Single source s terminal t i terminal Capacity for network coe for multicast mim{maxflow( s t i ) i =... m} t m terminal 7

18 Max-flow min-cut theorem Min-cut t s isjoint path t Max-flow from source s to terminal t_{} maxflow( s t ) = Information flow graph 8

19 Repairable istribute storage system ( Network coing for multicast )(/) Repaire noes k Message B DC k DC n- n Keep n active noes in a network 9

20 Repairable istribute storage system ( Network coing for multicast )(/) k Message B DC k DC n- n 0

21 Repairable istribute storage system ( Network coing for multicast )(/) k Message B Multicast DC k DC n- n

22 Capacity for (nkαb)regenerating Coes(/) isjoint path k Message B DC k DC n- n

23 Capacity for (nkαb)regenerating Coes(/) k Message B DC - α α in out - in α Zoom in out in α out k DC

24 Capacity for (nkαb)regenerating Coes(/) Message B - in α out in - α out in α out k DC isjoint path Flow from Source to DC

25 Capacity for (nkαb)regenerating Coes(/) Message B - in α out in α out k - in α out DC isjoint path

26 Capacity for (nkαb)regenerating Coes(/) Message B in α min{ α } - out in α out k isjoint path min{ (-) α } - in α min{ (-) α } out DC The Capacity C for (nkαb)regenerating Coes Min-cut C = k i= min{( i + ) α} B Information flow graph 6

27 MSR an MBR points (α) Capacity for (nkαb) regenerating coes Minimum Storage Regenerating(MSR) point Minimum Banwith Regenerating(MBR) point 7 = + = k i i C } ) min{( α + = = ) ( k k B α α + = = ) ( k k B α

28 Traeoff between Storage α an Repair-Banwith Banwith to repair one noe / / /9 O Minimum Storage Regenerating(MSR) point (α) point / /8 /9 Storage per noe α ( B= k= = ) Minimum Banwith Regenerating(MBR) point α 8

29 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 9

30 Exact vs. Functional Regeneration [Rashmi et al.0] Functional-Regeneration(Functional-Repair) The resulting network of n noes continues to possess reconstruction an regeneration properties Exact-Regeneration(Exact-Repair) The repaire noe stores exactly the same ata as was store in it prior to failure. Functional-Repair Partial Exact-Repair Exact-Repair (Creit : Fig. in [Suh et al. 00]) 0

31 Coes for regenerations Functional-Regeneration Network Coing for multicast (Multicasting Problem on information flow graph) [Dimakis et al.007][wu et al.007] [Dimakis et al.00] Partial Exact-Regeneration Interference alignment (MSR coes =n-)[shah et al.00] ( MSR coes with systematic-noes an parity-noes ) Exact-Regeneration Interference alignment (MSR coes) [Suh et al.0] [Shah et al.0b] Complete graph an MDS coe (MBR coes) [Shah et al. 0a] Prouct-Matrix framework [Rashmi et al.0] (nk) MBR coes for all values of (nk) (nk) MSR coes for all values of (nk) >=k- (the first- general- explicit- exact-constructions of MSR an MBR coes)

32 MSR coes by Interference alignment (Fig. in [Suh et al.00]) ( n= k=α= = = B= ) MSR coe example Share (size α=) Systematic noe a a Message B= a a b b Parity noe a a a a b b + b + b + b + b = Regeneration b + b a + + a + b b a + a + b + b piece (size =) piece (size =) piece (size =) Noe a a

33 MBR an MSR coes on Prouct-Matrix framework [Rashmi et al.0] Using the property of symmetric matrices such that if a matrix M is a symmetric matrix then where M A ( t t AM ) = MA : x : x symmetric matrix matrix AB ( AB) t BA example BA t since t t t t M A = ( A M ) = ( A M ) M = M t

34 ( n k )MBR coes n by complete graph an ( B )MDS coe[shah et al.0](/) k (=α=n- = B= (n-)k - ) example (n= k==α= = B=6) MBR coe Share message u u 6 c c c c c c c c c 6 c c c c c c c 6 c c 6 Complete graph with n= noes an n eges

35 MBR coes by Complete graph an MDS coe (/) example (n= k==α= = B=6) MBR coe Share message c c c c c c Reconstruction DC u u 6 c c c c c c6 c c c c c6 c c c 6 c Noe Regeneration c c c

36 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 6

37 Information flow Share -vector message ( size B ) u u u 6 Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 7

38 Secure Regenerating Coes (Secret Sharing base on Regenerating Coes) Share -vector message ( size B ) S secret R Ranom symbols Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 8

39 Regeneration by reconstruction message B S S R R R R encoing cut Share α c c c c c c c c c c c Share c c c c c k Entire message c c Repair-Banwith kα=b Reconstruction S S R R R R encoing 9

40 Regeneration by regenerating coes cut Share α message B S S R R R R encoing c c c c c c c c c c Noe Repair the faile noe -vector = ( ) (piece-vector size ) Regeneration c c Repair-Banwith <B) ( Exact-regeneration ) 0

41 Secure Regenerating Coes (Secret sharing base on Regenerating coes) Exact-Regeneration(MSR an MBR coes) Informationally secure regenerating coes Secure MBR coes Complete graph an MDS coe : [Pawar et al. 0] Prouct-Matrix framework : Secure MSR coes [Kurihara an Kuwakao0]( non-linear ramp scheme) [Shah et al. 0] Prouct-Matrix framework : [Kurihara an Kuwakao0ab] [Kuwakao an Kurihara0] Computationally secure regenerating coes [Kuwakao an Kurihara0] [Shah et al. 0]

42 Computationally-Secure Regenerating(CS-R) coes message [Kuwakao an Kurihara0] Ranom symbols secret Regenerating coe Informationally-Secure Regenerating(IS-R) coe share share Creit: Kuwakao an Kurihara Computationally-Secure Regenerating coe CSS0

43 Computationally-Secure Regenerating(CS-R) coes message Ranom symbols Key Regenerating coe [Kuwakao an Kurihara0] Improve Coing Rate Informational security (IS-R coe) secret encripting ciphertext Regenerating coe Computational security share share Creit: Kuwakao an Kurihara Computationally-Secure Regenerating coe CSS0 share

44 Recall ( n k )MBR coes n by complete graph an ( B )MDS coe[shah et al.0a] (=α=n- = B= (n-)k - k ) example (n= k==α= = B=6) MBR coe Share message u u 6 c c c c c c c c c 6 c c c c c c c 6 c c 6 Complete graph with n= noes an n eges

45 Secure ( n k )MBR coes [Pawar et al. 0] by Complete graph an MDS coe example (n= k==α= = l= ) secure MBR coe Message B=6 u u 6 c c c Share c c c c c c 6 Setting : S :Secret R R... R : Ranom symbols Perfect secrecy for at most two shares Encoing : S R R R R R c c c 6 (Fig. in [Pawar et al. 0]) c c = R for i =... i i 6 = S + R + R R

46 Secure Regenerating Coes (Secret Sharing base on Regenerating Coes) Share -vector message ( size B ) S secret R Ranom symbols Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 6

47 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Ranom variables - Secret : - Share : - : - -Vector : C D D ( i f h Reconstruction Property S For any k shares i f D Regeneration Property ( faile noe ) For any pieces for repair the faile noe that is piece-vector ( = n) f = ( D {... n} h {... n}\{ f }) f C C k f H ( S C ) = C k ) ( f 0 D f D f D f H ( C f D f ) = 0 {... n}) f f 7

48 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Regeneration Property ( faile noe ) For any pieces for repair the faile noe D f D f D f that is piece-vector C f H ( C f D f ) = 0 (The share is uniquely etermine from the piece-vector.) H ( S D ) H ( S C f In general f i.e. f since the Markov chain S D f C f. Thus if I( S; ) = 0 then I( S; ) = 0 because D f However it is not always true that H ( D f C f ) 0. ) H ( S) = H ( S D ) H ( S C ) H ( S) f C f f I( S; D ) I( S; C f f ) f D f 8

49 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Secrecy property For m piece-vector D for any m repaire noes f H ( S D D ) H ( S) Secrecy capacity for (n k α B ; m ) secure regeneration coe : C S = C S sup H ( S) H ( S C Ck ) = 0 H ( S D D ) = H ( S) The upper boun of the secrecy capacity : f D fm m f fm = m Reconstruction Property C S k i= m+ min{( i + ) α} Information flow graph 9

50 Conclusions Regenerating coes for istribute storage [Dimakis et al.00] Reconstruction an Regeneration(repair faile noe) Reucing banwith to repair Traeoff between Storage an Repair-Banwith MSR an MBR coes Network coing for istribute storage [Dimakis et al.00] Capacity for regenerating coes Linear network coing for multicast Exact-regeneration vs. Functional-regeneration Secure Regenerating Coes Secret sharing base on (exact-)regenerating coes Share piece an piece-vector 0

51 References(/) [Dimakis et al.00] Dimakis A.G.; Gofrey P.B.; Yunnan Wu; Wainwright M.J.; Ramchanran K.; Network Coing for Distribute Storage Systems Information Theory IEEE Transactions on Volume: 6 Issue: 9 Publication Year: 00 Page(s): 9 [Dimakis et al.007]a. G. Dimakis P. B. Gofrey Y. Wu M. Wainwright an K. Ramchanran "Network coing for istribute storage systems" Proc. IEEE INFOCOM 007 [Wu et al.007]y. Wu A. G. Dimakis an K. Ramchanran "Deterministic regenerating coes for istribute storage" Proc. Allerton Conf. Control Computing an Communication 007 [Rashmi et al.0] Rashmi K.V.; Shah N.B.; Kumar P.V.; Optimal Exact-Regenerating Coes for Distribute Storage at the MSR an MBR Points via a Prouct-Matrix Construction Information Theory IEEE Transactions on Volume: 7 Issue: 8 Publication Year: 0 Page(s): 7-9 [Suh et al.0] Changho Suh; Ramchanran K.; Exact-Repair MDS Coe Construction Using Interference Alignment Information Theory IEEE Transactions on Volume: 7 Issue: Publication Year: 0 Page(s): -

52 References(/) [Shah et al.00]n. B. Shah K. V. Rashmi P. V. Kumar an K. Ramchanran Explicit coes minimizing repair banwith for istribute storage in Proc. IEEE Information Theory Workshop Cairo Egypt Jan.00. [Shah et al.0] Shah N.B.; Rashmi K.V.; Kumar P.V.; Information-Theoretically Secure Regenerating Coes for Distribute Storage Global Telecommunications Conference (GLOBECOM 0) 0 IEEE Publication Year: 0 Page(s): [Shah et al.0a] Shah N.B.; Rashmi K.V.; Vijay Kumar P.; Ramchanran K.; Distribute Storage Coes With Repair-by-Transfer an Nonachievability of Interior Points on the Storage- Banwith Traeoff Information Theory IEEE Transactions on Volume: 8 Issue: 0 Page(s): 87-8 [Shah et al.0b] Shah N. B.; Rashmi K. V.; Kumar P. V.; Ramchanran K.; Interference Alignment in Regenerating Coes for Distribute Storage: Necessity an Coe Constructions Information Theory IEEE Transactions on Volume: 8 Issue: 0 Page(s): - 8 [Pawaer et al.0] Pawar S.; El Rouayheb S.; Ramchanran K.; Securing Dynamic Distribute Storage Systems Against Eavesropping an Aversarial Attacks Information Theory IEEE Transactions on Volume: 7 Issue: 0 0 Page(s): 67-67

53 References(/) [Kurihara an Kuwakao0a]M.Kurihara an H.Kuwakao ``On regenerating coes an secret sharing for istribute storage'' IEICE Technical Report(in Japanese) IT00-6(0-0) pp.-8(in Japanese) Jan. 0. [Kurihara an Kuwakao0b]M.Kurihara an H.Kuwakao `On an extene version of Rashmi-Shah-Kumar regenerating coes an secret sharing for istribute storage'' IEICE Technical Report IT00-(0-0) pp.0-0(in Japanese) Mar. 0. [Kurihara an Kuwakao0c]M.Kurihara an H.Kuwakao ``On ramp secret sharing schemes for istribute storage systems uner repair ynamics'' IEICE Technical Report IT0-7(0-7) pp.-6(in Japanese) July 0. [Kurihara an Kuwakao0]M.Kurihara an H.Kuwakao ``Ramp secret sharing schemes base on MBR coes'' IEICE Technical Report ISEC0-(0-) pp.6-68(in Japanese) Nov. 0. [Kuwakao an Kurihara an0]h.kuwakao an M.Kurihara ``Computationally-Secure Regenerating Coe'' Proceeings of Computer Security Symposium 0 pp Oct. 0.

54 The last slie Delete 6 pages in which recent results ware written. [Kurihara an Kuwakao 0] (See the full version) // 時 分

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science

More information

Coding Techniques for Distributed Storage Systems

Coding Techniques for Distributed Storage Systems Coding Techniques for Distributed Storage Systems Jung-Hyun Kim, {jh.kim06}@yonsei.ac.kr, Hong-Yeop Song Yonsei Univ. Seoul, KORE 3 rd CITW, Oct. 25. 1, 2013 Contents Introduction Codes for Distributed

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Information-theoretically Secure Regenerating Codes for Distributed Storage

Information-theoretically Secure Regenerating Codes for Distributed Storage Information-theoretically Secure Regenerating Codes for Distributed Storage Nihar B. Shah, K. V. Rashmi and P. Vijay Kumar Abstract Regenerating codes are a class of codes for distributed storage networks

More information

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed

More information

Enabling Node Repair in Any Erasure Code for Distributed Storage

Enabling Node Repair in Any Erasure Code for Distributed Storage Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Regenerating Codes for Errors and Erasures in Distributed Storage

Regenerating Codes for Errors and Erasures in Distributed Storage Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage

An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage Chenhui LI*, Songtao LIANG* * Shanghai Key Laboratory of Intelligent Information Processing, Fudan University,

More information

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions 2134 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 4, APRIL 2012 Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P

More information

Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges. Kannan Ramchandran

Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges. Kannan Ramchandran Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges Kannan Ramchandran University of California, Berkeley Joint work with: Salim El Rouayheb (UCB), Hao Zhang (UCB), Sameer

More information

BASIC Regenerating Code: Binary Addition and Shift for Exact Repair

BASIC Regenerating Code: Binary Addition and Shift for Exact Repair BASIC Regenerating Code: Binary Addition and Shift for Exact Repair Hanxu Hou, Kenneth W. Shum, Minghua Chen and Hui Li Shenzhen Eng. Lab of Converged Networks Technology, Shenzhen Key Lab of Cloud Computing

More information

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Quan Yu Department of Electronic Engineering City University of Hong Kong Email: quanyu2@student.cityu.edu.hk Kenneth

More information

EECS 121: Coding for Digital Communication & Beyond Fall Lecture 22 December 3. Introduction

EECS 121: Coding for Digital Communication & Beyond Fall Lecture 22 December 3. Introduction EECS 121: Coding for Digital Communication & Beyond Fall 2013 Lecture 22 December 3 Lecturer: K. V. Rashmi Scribe: Ajay Shanker Tripathi 22.1 Context Introduction Distributed storage is a deeply relevant

More information

Fractional Repetition Codes for Repair in Distributed Storage Systems

Fractional Repetition Codes for Repair in Distributed Storage Systems Fractional Repetition Codes for Repair in Distributed Storage Systems Salim El Rouayheb and Kannan Ramchandran Department of Electrical Engineering and Computer Sciences University of California, Bereley

More information

Codes for Modern Applications

Codes for Modern Applications Codes for Modern Applications Current Research Topics in the Code and Signal Design Group P. Vijay Kumar Indian Institute of Science, Bangalore, India Nov. 16, 2018 1/28 Codes for Modern Applications:

More information

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment Saravana

More information

DRESS Code For The Storage Cloud

DRESS Code For The Storage Cloud DRESS Code For The Storage Cloud Distributed Replication-based Exact Simple Storage Salim El Rouayheb EECS Department University of California, Berkeley Joint work with: Sameer Pawar Nima Noorshams Prof.

More information

Your Data is in the Cloud: Who Exactly is Looking After It?

Your Data is in the Cloud: Who Exactly is Looking After It? Your Data is in the Cloud: Who Exactly is Looking After It? P Vijay Kumar Dept of Electrical Communication Engineering Indian Institute of Science IISc Open Day March 4, 2017 1/33 Your Data is in the Cloud:

More information

Duality for Simple Multiple Access Networks

Duality for Simple Multiple Access Networks Duality for Simple Multiple Access Networks Iwan Duursma Department of Mathematics and Coordinated Science Laboratory U of Illinois at Urbana-Champaign DIMACS Workshop on Network Coding December 15-17,

More information

A survey on regenerating codes

A survey on regenerating codes International Journal of Scientific and Research Publications, Volume 4, Issue 11, November 2014 1 A survey on regenerating codes V. Anto Vins *, S.Umamageswari **, P.Saranya ** * P.G Scholar, Department

More information

On Coding Techniques for Networked Distributed Storage Systems

On Coding Techniques for Networked Distributed Storage Systems On Coding Techniques for Networked Distributed Storage Systems Frédérique Oggier frederique@ntu.edu.sg Nanyang Technological University, Singapore First European Training School on Network Coding, Barcelona,

More information

Cooperative Pipelined Regeneration in Distributed Storage Systems

Cooperative Pipelined Regeneration in Distributed Storage Systems Cooperative ipelined Regeneration in Distributed Storage Systems Jun Li, in Wang School of Computer Science Fudan University, China Baochun Li Department of Electrical and Computer Engineering University

More information

When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable

When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable Imad Ahmad, Chih-Chun Wang; {ahmadi,chihw}@purdue.edu School of Electrical and Computer Engineering, Purdue University,

More information

Resume Maintaining System for Referral Using Cloud Computing

Resume Maintaining System for Referral Using Cloud Computing Resume Maintaining System for Referral Using Cloud Computing Pranjali A. Pali 1, N.D. Kale 2 P.G. Student, Department of Computer Engineering, TSSM S PVPIT, Bavdhan, Pune, Maharashtra India 1 Associate

More information

Codes for distributed storage from 3 regular graphs

Codes for distributed storage from 3 regular graphs Codes for distributed storage from 3 regular graphs Shuhong Gao, Fiona Knoll, Felice Manganiello, and Gretchen Matthews Clemson University arxiv:1610.00043v1 [cs.it] 30 Sep 2016 October 4, 2016 Abstract

More information

Capacity Assurance in Hostile Networks

Capacity Assurance in Hostile Networks PhD Dissertation Defense Wednesday, October 7, 2015 3:30 pm - 5:30 pm 3112 Engineering Building Capacity Assurance in Hostile Networks By: Jian Li Advisor: Jian Ren ABSTRACT Linear network coding provides

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Symmetric Private Information Retrieval For MDS Coded Distributed Storage

Symmetric Private Information Retrieval For MDS Coded Distributed Storage Symmetric Private Information Retrieval For DS Coded Distributed Storage Qiwen Wang, and ikael Skoglund School of Electrical Engineering, KTH Royal Institute of Technology Email: {qiwenw, skoglund}@kthse

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

Synchronizing Edits in Distributed Storage Networks

Synchronizing Edits in Distributed Storage Networks Synchronizing Edits in Distributed Storage Networks Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic Department of Electrical and Computer Engineering, Illinois Institute of Technology,

More information

On Data Parallelism of Erasure Coding in Distributed Storage Systems

On Data Parallelism of Erasure Coding in Distributed Storage Systems On Data Parallelism of Erasure Coding in Distributed Storage Systems Jun Li, Baochun Li Department of Electrical and Computer Engineering, University of Toronto, Canada {junli, bli}@ece.toronto.edu Abstract

More information

Hybrid Approaches for Distributed Storage Systems

Hybrid Approaches for Distributed Storage Systems Hybrid Approaches for Distributed Storage Systems Julio Araujo, Frédéric Giroire, Julian Monteiro To cite this version: Julio Araujo, Frédéric Giroire, Julian Monteiro. Hybrid Approaches for Distributed

More information

Modern Erasure Codes for Distributed Storage Systems

Modern Erasure Codes for Distributed Storage Systems Modern Erasure Codes for Distributed Storage Systems Srinivasan Narayanamurthy (Srini) NetApp Everything around us is changing! r The Data Deluge r Disk capacities and densities are increasing faster than

More information

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems

CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems Runhui Li, Jian Lin, Patrick P. C. Lee Department of Computer Science and Engineering,

More information

Modern Erasure Codes for Distributed Storage Systems

Modern Erasure Codes for Distributed Storage Systems Modern Erasure Codes for Distributed Storage Systems Storage Developer Conference, SNIA, Bangalore Srinivasan Narayanamurthy Advanced Technology Group, NetApp May 27 th 2016 1 Everything around us is changing!

More information

Latency Analysis for Distributed Storage

Latency Analysis for Distributed Storage Latency Analysis for Distributed Storage Parimal Parag, Archana Bura Department of Electrical Communication Engineering Indian Institute of Science, Bengaluru, KA 56002, India parimal, archanabura}@ece.iisc.ernet.in

More information

Performance Models of Access Latency in Cloud Storage Systems

Performance Models of Access Latency in Cloud Storage Systems Performance Models of Access Latency in Cloud Storage Systems Qiqi Shuai Email: qqshuai@eee.hku.hk Victor O.K. Li, Fellow, IEEE Email: vli@eee.hku.hk Yixuan Zhu Email: yxzhu@eee.hku.hk Abstract Access

More information

Broadcast Repair for Wireless Distributed Storage Systems

Broadcast Repair for Wireless Distributed Storage Systems Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

An Application of deterministic Network Coding in MANETs

An Application of deterministic Network Coding in MANETs An Application of deterministic Network Coding in MANETs Leenta M.J. Grobler, Albert S.J. Helberg, Henri Marais, Coenraad C. Naudé School for Electrical, Electronic and Computer Engineering North-West

More information

arxiv: v1 [cs.it] 9 Oct 2012

arxiv: v1 [cs.it] 9 Oct 2012 Coding for Fast Content Download Gauri Joshi EECS Dept., MIT Cambridge, MA 0239, USA Email: gauri@mit.edu Yanpei Liu ECE Dept., Univ. Wisconsin Madison Madison, WI, 53705, USA Email: yliu73@wisc.edu Emina

More information

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Razan Tajeddine Salim El Rouayheb ECE Department IIT Chicago Emails: rtajeddi@hawiitedu salim@iitedu arxiv:160201458v1 [csit]

More information

A Survey on Erasure Coding Techniques for Cloud Storage System

A Survey on Erasure Coding Techniques for Cloud Storage System A Survey on Erasure Coding Techniques for Cloud Storage System Kiran P. Pawar #1, R. M. Jogdand *2 #1 M.Tech, Department of Computer Science, Gogte Institute of technology, Udyambag Belagavi, Karnataka,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Contents on the Move: Content Caching and Delivery at the Wireless Network Edge

Contents on the Move: Content Caching and Delivery at the Wireless Network Edge Contents on the Move: Content Caching an Delivery at the Wireless Network Ege Deniz Günüz Imperial College Lonon 20 June 2017 icore/ Commnet2 Joint Workshop: Content Caching an Distribute Storage for Future

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Source Coding with Distortion through Graph Coloring

Source Coding with Distortion through Graph Coloring Source Coding with Distortion through Graph Coloring Vishal Doshi, Devavrat Shah, and Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139

More information

PROTECTING the privacy of downloaded information

PROTECTING the privacy of downloaded information IEEE TRASACTIOS O IFORMATIO THEORY, VO. 64, O. 3, MARCH 208 945 The Capacity of Private Information Retrieval From Coded Databases arim Banawan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE Abstract

More information

Secret Share Dissemination across a Network

Secret Share Dissemination across a Network Secret Share Dissemination across a Network Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {nihar, rashmikv,

More information

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds Secret Sharing Across a Network with Low Communication Cost: istributed Algorithm and Bounds Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran, Fellow, IEEE epartment of Electrical Engineering and Computer

More information

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura

THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Max-Flow Protection using Network Coding

Max-Flow Protection using Network Coding Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State

More information

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015

L3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015 L3. An Introduction to Block Ciphers Rocky K. C. Chang, 29 January 2015 Outline Product and iterated ciphers A simple substitution-permutation network DES and AES Modes of operations Cipher block chaining

More information

Design of Orthogonal Graph Wavelet Filter Banks

Design of Orthogonal Graph Wavelet Filter Banks Design of Orthogonal Graph Wavelet Filter Banks Xi ZHANG Department of Communication Engineering and Informatics The University of Electro-Communications Chofu-shi, Tokyo, 182-8585 JAPAN E-mail: zhangxi@uec.ac.jp

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

On Secure Distributed Data Storage Under Repair Dynamics

On Secure Distributed Data Storage Under Repair Dynamics On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar Salim El Rouayheb Kannan Ramchandran Electrical Engeerg and Computer Sciences University of California at Berkeley Technical Report

More information

OPTIMIZING THE POWER USING FUSED ADD MULTIPLIER

OPTIMIZING THE POWER USING FUSED ADD MULTIPLIER Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

PIR schemes with small download complexity and low storage requirements

PIR schemes with small download complexity and low storage requirements PIR schemes with small download complexity and low storage requirements By Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson Birkbeck Pure Mathematics Preprint Series Preprint Number 24 www.bbk.ac.uk/ems/research/pure/preprints

More information

Network Image Coding for Multicast

Network Image Coding for Multicast Network Image Coding for Multicast David Varodayan, David Chen and Bernd Girod Information Systems Laboratory, Stanford University Stanford, California, USA {varodayan, dmchen, bgirod}@stanford.edu Abstract

More information

Fast Data Encipherment Algorithm FEAL. Electrical Communication Laboratories, NTT , Take, Yokosuka-shi, Kanagawa-ken, , Japan

Fast Data Encipherment Algorithm FEAL. Electrical Communication Laboratories, NTT , Take, Yokosuka-shi, Kanagawa-ken, , Japan Fast Data Encipherment Algorithm FEAL Akihiro Shimizu 81 Shoj i. Miyaguchi Electrical Communication Laboratories, NTT 1-2356, Take, Yokosuka-shi, Kanagawa-ken, 238-03, Japan BACKGROUND In data communications

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Unit 1 Lesson 13 Proving Theorems involving parallel and perp lines WITH ANSWERS!.notebook. Proofs involving Parallel lines

Unit 1 Lesson 13 Proving Theorems involving parallel and perp lines WITH ANSWERS!.notebook. Proofs involving Parallel lines Unit 1 Lesson 13 Proofs involving Parallel lines We will need to recall the different postulates and Theorems involving Parallel lines... Can you name the following types of angles from the diagram below???

More information

Graph based codes for distributed storage systems

Graph based codes for distributed storage systems /23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA

More information

Loopy Belief Propagation

Loopy Belief Propagation Loopy Belief Propagation Research Exam Kristin Branson September 29, 2003 Loopy Belief Propagation p.1/73 Problem Formalization Reasoning about any real-world problem requires assumptions about the structure

More information

Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects

Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects 1293 Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects F. Xiao and Y. Kami University of Electro-Communications, Japan Abstract The crosstalk between a single-ended

More information

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes

Performance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Guessing Facets: Polytope Structure and Improved LP Decoder

Guessing Facets: Polytope Structure and Improved LP Decoder Appeared in: International Symposium on Information Theory Seattle, WA; July 2006 Guessing Facets: Polytope Structure and Improved LP Decoder Alexandros G. Dimakis 1 and Martin J. Wainwright 1,2 1 Department

More information

PERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION

PERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION 20th European Signal Processing Conference EUSIPCO 2012) Bucharest, Romania, August 27-31, 2012 PERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION Mauricio Lara 1 and Bernard Mulgrew

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

A generalized precompiling scheme for surviving path memory management in Viterbi decoders

A generalized precompiling scheme for surviving path memory management in Viterbi decoders A generalized precompiling scheme for surviving path memory management in Viterbi decoders Emmanuel BOUTON, Nicolas DEMASSEUX Telecom Paris, E.N.S.T, 46 rue Barrault, 75634 PARS CEDEX 3, FRANCE e-mail

More information

Network Coding for Three Unicast Sessions: Interference Alignment Approaches

Network Coding for Three Unicast Sessions: Interference Alignment Approaches Network Coding for Three Unicast Sessions: Interference Alignment Approaches Abinesh Ramakrishnan, Abhik Das, Hamed Maleki, Athina Markopoulou, Syed Jafar, Sriram Vishwanath EECS Dept., University of California,

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Delegating Auditing Task to TPA for Security in Cloud Computing

Delegating Auditing Task to TPA for Security in Cloud Computing Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper

More information

A Communication Architecture for Large Heterogeneous Wireless Networks

A Communication Architecture for Large Heterogeneous Wireless Networks A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent

More information

Privacy, Security, and Repair in Distributed Storage Systems. Siddhartha Kumar

Privacy, Security, and Repair in Distributed Storage Systems. Siddhartha Kumar Privacy, Security, and Repair in Distributed Storage Systems Siddhartha Kumar Thesis for the Degree of Philosophiae Doctor (PhD) University of Bergen, Norway 2018 Privacy, Security, and Repair in Distributed

More information

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks

A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 125-132 International Research Publications House http://www. ripublication.com A Distributed

More information

International Journal of Wavelets, Multiresolution and Information Processing c World Scientific Publishing Company

International Journal of Wavelets, Multiresolution and Information Processing c World Scientific Publishing Company International Journal of Wavelets, Multiresolution and Information Processing c World Scientific Publishing Company IMAGE MIRRORING AND ROTATION IN THE WAVELET DOMAIN THEJU JACOB Electrical Engineering

More information

The Modified Scheme is still vulnerable to. the parallel Session Attack

The Modified Scheme is still vulnerable to. the parallel Session Attack 1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract

More information

Planar Graphs with Many Perfect Matchings and Forests

Planar Graphs with Many Perfect Matchings and Forests Planar Graphs with Many Perfect Matchings and Forests Michael Biro Abstract We determine the number of perfect matchings and forests in a family T r,3 of triangulated prism graphs. These results show that

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users

Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

Rate-optimal Binary Locally Repairable Codes with Joint Information Locality CSDL. Yonsei University, Korea ( jh.kim06, my.nam,

Rate-optimal Binary Locally Repairable Codes with Joint Information Locality CSDL. Yonsei University, Korea ( jh.kim06, my.nam, Rate-optimal Binary Locally Repairable Codes with Joint Information Locality CSDL Jung-Hyun Kim, Mi-Young Nam, and Hong-Yeop Song Yonsei University, Korea ( jh.kim6, my.nam, hysong@yonsei.ac.kr) 25 / /

More information

Erasure Codes for Heterogeneous Networked Storage Systems

Erasure Codes for Heterogeneous Networked Storage Systems Erasure Codes for Heterogeneous Networked Storage Systems Lluís Pàmies i Juárez Lluís Pàmies i Juárez lpjuarez@ntu.edu.sg . Introduction Outline 2. Distributed Storage Allocation Problem 3. Homogeneous

More information