Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Tauz, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.00192  [pdf, other

    cs.IT

    Block-MDS QC-LDPC Codes for Information Reconciliation in Key Distribution

    Authors: Lev Tauz, Debarnab Mitra, Jayanth Shreekumar, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: Quantum key distribution (QKD) is a popular protocol that provides information theoretically secure keys to multiple parties. Two important post-processing steps of QKD are 1) the information reconciliation (IR) step, where parties reconcile mismatches in generated keys through classical communication, and 2) the privacy amplification (PA) step, where parties distill their common key into a new se… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 7 pages, 1 figure, submitted to the International Symposium on Information Theory (ISIT) 2024

  2. arXiv:2305.07983  [pdf, other

    cs.IT cs.CR

    Fully Private Grouped Matrix Multiplication with Colluding Workers

    Authors: Lev Tauz, Lara Dolecek

    Abstract: In this paper, we present a novel variation of the coded matrix multiplication problem which we refer to as fully private grouped matrix multiplication (FPGMM). In FPGMM, a master wants to compute a group of matrix products between two matrix libraries that can be accessed by all workers while ensuring that any number of prescribed colluding workers learn nothing about which matrix products the ma… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: 7 pages, 3 figures, submitted to the International Symposium on Information Theory (ISIT) 2023

  3. arXiv:2305.00956  [pdf, other

    cs.IT

    Non-Binary LDPC Code Design for Energy-Time Entanglement Quantum Key Distribution

    Authors: Debarnab Mitra, Lev Tauz, Murat Can Sarihan, Chee Wei Wong, Lara Dolecek

    Abstract: In energy-time entanglement Quantum Key Distribution (QKD), two users extract a shared secret key from the arrival times (discretized as symbols) of entangled photon pairs. In prior work, Zhou et al. proposed a multi-level coding (MLC) scheme that splits the observed symbols into bit layers and utilizes binary Low-Density Parity-Check (LDPC) codes for reconciliation of the symbols. While binary LD… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 5 pages, 4 figures, submitted to International Symposium on Topics in Coding

  4. arXiv:2301.08295  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Polar Code Design

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2DRS) codes with Merkle trees to mitigate DA attacks. These codes perform well across various metrics such as DA detection probability and communication cost. However, these codes are difficult to apply to bl… ▽ More

    Submitted 19 January, 2023; originally announced January 2023.

    Comments: 36 pages, 10 figures, 2 tables, submitted to IEEE Journal on Selected Areas in Information Theory

  5. arXiv:2201.07287  [pdf, other

    cs.IT cs.CR

    Polar Coded Merkle Tree: Improved Detection of Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where they accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle Trees to mitigate DA attacks. While these codes have demonstrated improved performance across a variety of metrics such as DA detection probability, they are difficul… ▽ More

    Submitted 16 May, 2022; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: 9 pages, 4 figures, 2 tables, To appear in IEEE International Symposium on Information Theory (ISIT) 2022

  6. Overcoming Data Availability Attacks in Blockchain Systems: Short Code-Length LDPC Code Design for Coded Merkle Tree

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: Light nodes are clients in blockchain systems that only store a small portion of the blockchain ledger. In certain blockchains, light nodes are vulnerable to a data availability (DA) attack where a malicious node makes the light nodes accept an invalid block by hiding the invalid portion of the block from the nodes in the system. Recently, a technique based on LDPC codes called Coded Merkle Tree w… ▽ More

    Submitted 27 August, 2022; v1 submitted 30 August, 2021; originally announced August 2021.

    Comments: 18 pages, 7 figures, 3 tables, accepted at IEEE Transactions on Communications (TCOM) 2022. This version reflects comments from reviewers at TCOM

  7. arXiv:2105.06162  [pdf, other

    cs.IT

    Variable Coded Batch Matrix Multiplication

    Authors: Lev Tauz, Lara Dolecek

    Abstract: A majority of coded matrix-matrix computation literature has broadly focused in two directions: matrix partitioning for computing a single computation task and batch processing of multiple distinct computation tasks. While these works provide codes with good straggler resilience and fast decoding for their problem spaces, these codes would not be able to take advantage of the natural redundancy of… ▽ More

    Submitted 31 December, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: 35 pages, 8 figures, a part of this manuscript was published at IEEE Global Communications Conference (GLOBECOM) 2021

  8. arXiv:2105.06004  [pdf, other

    cs.IT cs.CR

    Communication-Efficient LDPC Code Design for Data Availability Oracle in Side Blockchains

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: A popular method of improving the throughput of blockchain systems is by running smaller side blockchains that push the hashes of their blocks onto a trusted blockchain. Side blockchains are vulnerable to stalling attacks where a side blockchain node pushes the hash of a block to the trusted blockchain but makes the block unavailable to other side blockchain nodes. Recently, Sheng et al. proposed… ▽ More

    Submitted 25 August, 2021; v1 submitted 12 May, 2021; originally announced May 2021.

    Comments: 7 pages, 2 figures, 2 tables, To appear in Information Theory Workshop (ITW) 2021

  9. arXiv:2010.07363  [pdf, other

    cs.IT cs.CR

    Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

    Authors: Debarnab Mitra, Lev Tauz, Lara Dolecek

    Abstract: In certain blockchain systems, light nodes are clients that download only a small portion of the block. Light nodes are vulnerable to data availability (DA) attacks where a malicious node hides an invalid portion of the block from the light nodes. Recently, a technique based on erasure codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack wit… ▽ More

    Submitted 23 January, 2021; v1 submitted 14 October, 2020; originally announced October 2020.

    Comments: 6 pages, 5 figures, To appear in Information Theory Workshop (ITW) 2020

  10. arXiv:2001.05117  [pdf, other

    cs.IT

    Non-Uniform Windowed Decoding For Multi-Dimensional Spatially-Coupled LDPC Codes

    Authors: Lev Tauz, Homa Esfahanizadeh, Lara Dolecek

    Abstract: In this paper, we propose a non-uniform windowed decoder for multi-dimensional spatially-coupled LDPC (MD-SC-LDPC) codes over the binary erasure channel. An MD-SC-LDPC code is constructed by connecting together several SC-LDPC codes into one larger code that provides major benefits over a variety of channel models. In general, SC codes allow for low-latency windowed decoding. While a standard wind… ▽ More

    Submitted 11 May, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: 7 pages, 5 figures, submitted to International Symposium on Information Theory (ISIT) 2020

  11. arXiv:1908.02462  [pdf, other

    cs.IT

    Multi-Dimensional Spatially-Coupled Code Design: Enhancing the Cycle Properties

    Authors: Homa Esfahanizadeh, Lev Tauz, Lara Dolecek

    Abstract: A circulant-based spatially-coupled (SC) code is constructed by partitioning the circulants in the parity-check matrix of a block code into several components and piecing copies of these components in a diagonal structure. By connecting several SC codes, multi-dimensional SC (MD-SC) codes are constructed. In this paper, we present a systematic framework for constructing MD-SC codes with notably be… ▽ More

    Submitted 7 August, 2019; originally announced August 2019.

    Comments: 34 pages, 10 figures, submitted to IEEE Transactions on Communications (TCOM)