skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Adaptive Linear Secrecy Codes with Feedback
We identify a novel method of using feedback to provide enhanced information-theoretical security in the presence of an eavesdropper. This method begins with a fixed linear coset code providing both secrecy and error detection/correction, as has been described by several authors. The legitimate receiver then sends the syndrome information for the received codeword, and based on this feedback, the transmitter can provide further error correction information specifically tailored to assist only the legitimate receiver. We show that this method allows secure communication with the legitimate receiver even when the eavesdropper’s channel is superior to that of the legitimate receiver.  more » « less
Award ID(s):
1910812
PAR ID:
10490049
Author(s) / Creator(s):
;
Publisher / Repository:
International Foundation for Telemetering
Date Published:
Journal Name:
Proceedings International Telemetering Conference US
ISSN:
0884-5123
Format(s):
Medium: X
Location:
Las Vegas, NV
Sponsoring Org:
National Science Foundation
More Like this
  1. Semi-definite relaxation (SDR) has demonstrated the capability of approaching maximum-likelihood (ML) performance. In this work, we first develop a new SDR-based detector that exploits forward error correction (FEC) code information in the detection stage. The joint SDR detector substantially improves overall receiver performance by generating highly reliable information to downstream decoder. For further performance improvement, we integrate the joint SDR detector with decoder using a feedback link to form an iterative turbo receiver. Meanwhile, we propose a simplified SDR receiver that solves only one SDR problem per codeword instead of solving multiple SDR problems in the iterative turbo processing. This simplification significantly reduces the complexity of SDR turbo receiver, while maintaining a similarly superior error performance. 
    more » « less
  2. Quantum states decohere through interaction with the environment. Quantum error correction can preserve coherence through active feedback wherein quantum information is encoded into a logical state with a high degree of symmetry. Perturbations are detected by measuring the symmetries of the state and corrected by applying gates based on these measurements. To measure the symmetries without perturbing the data, ancillary quantum states are required. Shor error correction uses a separate quantum state for the measurement of each symmetry. Steane error correction maps the perturbations onto a logical ancilla qubit, which is then measured to check several symmetries simultaneously. We experimentally compare Shor and Steane correction of bit flip errors using the Bacon-Shor code implemented in a chain of 23 trapped atomic ions. We find that the Steane method produces fewer errors after a single round of error correction and less disturbance to the data qubits without error correction. 
    more » « less
  3. Due to the open nature of wireless medium, wireless communications are especially vulnerable to eavesdropping attacks. This paper designs a new wireless communication system to deal with eavesdropping attacks. The proposed system can enable a legitimate receiver to get desired messages and meanwhile an eavesdropper to hear ``fake" but meaningful messages by combining confidentiality and deception, thereby confusing the eavesdropper and achieving additional concealment that further protects exchanged messages. Towards this goal, we propose techniques that can conceal exchanged messages by utilizing wireless channel characteristics between the transmitter and the receiver, as well as techniques that can attract an eavesdropper to gradually approach a trap region, where the eavesdropper can get fake messages. We also provide both theoretical and empirical analysis of the established secure channel between the transmitter and the receiver. We develop a prototype system using Universal Software Defined Radio Peripherals (USRPs)Experimental results show that an eavesdropper at a trap location can receive fake information with a bit error rate (BER) close to 0, and the transmitter with multiple antennas can successfully deploy a trap area. 
    more » « less
  4. In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters the legitimate beamformimg design, facilitating eavesdropping. A recent approach proposed superimposing a random sequence on the training sequence at the legitimate receiver and then using the minimum description length (MDL) criterion to detect pilot contamination attack. In this paper we augment this approach with joint estimation of both legitimate receiver and eavesdropper channels, and secure beamforming, to mitigate the effects of pilot spoofing. The proposed mitigation approach is illustrated via simulations. 
    more » « less
  5. Abstract Large-scale quantum computers will inevitably need quantum error correction to protect information against decoherence. Traditional error correction typically requires many qubits, along with high-efficiency error syndrome measurement and real-time feedback. Autonomous quantum error correction instead uses steady-state bath engineering to perform the correction in a hardware-efficient manner. In this work, we develop a new autonomous quantum error correction scheme that actively corrects single-photon loss and passively suppresses low-frequency dephasing, and we demonstrate an important experimental step towards its full implementation with transmons. Compared to uncorrected encoding, improvements are experimentally witnessed for the logical zero, one, and superposition states. Our results show the potential of implementing hardware-efficient autonomous quantum error correction to enhance the reliability of a transmon-based quantum information processor. 
    more » « less