Download presentation
Presentation is loading. Please wait.
Published bySolomon Henderson Modified over 9 years ago
1
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES
2
Background – Communication Scenario 2 AliceBob 011100110110111101110011 Calvin Bad guy EncoderDecoder (Adversarial) Noisy Channel Message Decoded message Codeword Received word
3
Background – Related Work 3 “Benchmark” channel models One extreme: oblivious adversary q=2 (binary) R p 1 0.5 “ large ” q R p 1 1 (AVC capacity) “Like noisy” NOT BAD! (AVC capacity/folklore)
4
Background – Related Work 4 “Benchmark” channel models The other extreme: omniscient adversary One extreme: oblivious adversary q=2 (binary) R p 1 0.5 “ large ” q R p 1 1 [Sha48] [Reed- Solomon]/[Singleton] [McERRW77] [Gilbert Varshamov] Calvin WHAT? He knows “everything”! “ intermediate ” q p 1 0.5
5
Background – Related Work 5 Weaker channel models List-decoding - weakened reconstruction goal q=2 (binary) R p 1 0.5 “ large ” q R p 1 1 [Sha48] Computationally efficient list-decoding schemes LOOK!
6
Background – Related Work 6 Weaker channel models List-decoding - weakened reconstruction goal q=2 (binary) R p 1 0.5 “ large ” q R p 1 1 Smith-Guruswami Computationally efficient encoding/decoding schemes Computationally bounded adversaries - weakened adversary power Calvin LOOK! Micali-Sudan
8
Background – Related Work 8 Weaker channel models AVCs with common randomness between Alice and Bob Omniscient jammer with noiseless feedback Calvin AliceBob q=2 (binary) R p 1 0.5 [Sha48] [McERRW77] [Gilbert Varshamov] [Berlekamp] 1/3 “ large ” q R p 1 0.5
9
Calvin 9 Causal adversaries Between oblivious and omniscient adversaries 011?10??????? 13210456789131112 0011* ? 14 Transmitted Word Tampered Word CurrentFuture Calvin
10
10 Causal adversaries Between oblivious and omniscient adversaries Causal large alphabet Delayed adversary Causal “ large ” q R p 1 0.5 Delayed q=2 R p 1 0.5 [Sha48] Delayed “ large ” q (additive) R p 1 1 R p 1 1 d 0.5 Delayed “ large ” q (overwrite)
11
11 Causal adversaries Capacity
12
12 Causal adversaries Between oblivious and omniscient adversaries Analysis of all possible causal adversarial behaviours 1 One possible adversarial trajectory (Slopes are bounded)
13
Analysis of all possible causal adversarial behaviours Proof techniques overview - Converse: “Babble-and-push” attack 13 Causal adversaries 011?10??????? 13210456789131112 00111 ? 14 Transmitted Word Tampered Word Babbling phasePushing phase
14
Proof techniques overview - Converse: “Babble-and-push” attack 14 Causal adversaries Transmitted Word Tampered Word 1…0010110 10…6789131112 1…0110100 1 14 1 Selected Word 1…01011001 Pushing phase 1.Construct a set of codewords based on corrupted bits transmitted so far 2.Select one codeword from the set and then “push” the transmitted codeword towards the selected one Pushing phase
15
Proof techniques overview - Converse: “Babble-and-push” attack 15 Causal adversaries Transmitted Word Tampered Word 1…0010110 10…6789131112 1…0110100 1 14 1 Selected Word 1…01011001 Pushing phase 1.Construct a set of codewords based on corrupted bits transmitted so far 2.Select one codeword from the set and then “push” the transmitted codeword towards the selected one Pushing phase The tampered word lies in midway between the transmitted word and selected word.
16
Proof techniques overview - Converse: “Babble-and-push” attack 16 Causal adversaries Those codewords with prefix different from the observed prefix are discarded.
17
17 Causal adversaries 011?10??????? 13210456789131112 00111 ? 14 Transmitted Word Tampered Word List-decoding condition Proof techniques overview - Converse: “Babble-and-push” attack Energy-bounding condition Babbling phasePushing phase
18
Proof techniques overview - Converse: “Babble-and-push” attack 18 Causal adversaries Using stochastic encoders instead of deterministic encoders illustrated in previous slides Message
19
19 Causal adversaries Calvin
20
Proof techniques overview - Converse: “Babble-and-push” attack 20 Causal adversaries Proof techniques overview – Achievability 1 Trajectory of the “babble-and-push strategy” Possible decoding points
21
Proof techniques overview - Converse: “Babble-and-push” attack 21 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes
22
22 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes
23
23 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes Decoding process: list-decoding + unique decoding Obtain a list of messages List-decoding phase Unique decoding phase
24
24 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes Decoding process: list-decoding + unique decoding Obtain a list of messages List-decoding phase Unique decoding phase Encodings Consistency Checking If two words differ in a limited number of positions, they are said to be consistent.
25
25 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes Decoding process: list-decoding + unique decoding List of “right mega sub-codewords” Fail in consistency checking… Received “right mega sub-codeword”
26
26 Causal adversaries Proof techniques overview – Achievability Encoder: concatenated stochastic codes Decoding process: list-decoding + unique decoding With high probability, Bob succeeds in decoding Pass consistency checking! Received “right mega sub-codeword”
27
27 Limited-view adversaries: Multipath networks with large-alphabet symbols Adversary can see a certain fraction and jam another fraction Myopic adversaries: Adversary has (non-causal) view of a noisy version of Alice's transmission
28
THANKS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.