193
Teilnahmepflicht

Die Daten können in beliebige andere Systeme übernommen werden.

  • Nur Fachbereichsadmins können alles bearbeiten.
  • Der Reiter "Texte" darf weiterhin auch von Dozenten und Sekretariaten bearbeitet werden.
  • Hinweis: die manuelle Raumreservierung darf nur für Kurse benutzt werden, die den Status Publiziert oder in CM besitzen

Inhalte

In this lecture, we will complement the theory of information-theoretic security (WS) with a similar framework of information-theoretic founded identity and privacy. In this course, we will define relevant key metrics to capture privacy and identity in an information-theoretic framework, which includes typical approaches such as differential privacy in the computer science literature. We shall apply this framework to derive fundamental performance limits of identity provision system, private information retrieval. A dedicated treatment is given to information-theoretic approach to multiparty computation over wireless channels and their related tradeoffs.
 
Keywords: Information-theoretic privacy and identity management, key metrics, differential privacy, fundamental inequalities and achievable performance regions, identity provision systems, private information retrieval schemes, privacy-preserving distributed multiparty computation/learning, computation & communication tradeoffs, distributed (cloud-)native AI/ML solutions
 

Course objectives 

Security is a prerequisite of modern wireless communication systems and user services. In this course we will introduce a new security paradigm for communication systems called physical layer security (PLS). PLS is an advanced method envisioned to meet the advanced requirements of future communication systems such as low latency ('fast security') and 'plug & secure' functionality. PLS is based on a well-defined mathematical theory exploiting the inherent properties of the wireless channel such as noise and fading. The goal of the course is to present the information-theoretic foundations of PLS including the definition of secrecy capacity definitions for the point-to-point wireless channel with an eavesdropper ('wiretap channel') as well as secret key agreement from stochastic channel measurements.

The course will also take on the attackers view and address potential attacks. Finally, several potential deployment scenarios such as the Internet of Things will be discussed.

Course Content

  • Overview of security schemes in communication systems: layer model, asymmetric/symmetric encryption, PLS classifications
  • Wiretap channel: basic definitions and assumptions, secrecy capacity, strong/weak secrecy, coding methods, MIMO channel, multiuser aspects
  • Secret key agreement: source models, key generation, common randomness, reciprocal wireless channel, correlation properties
  • Attacker models: passive/active, 'man in the middle', jamming
  • Deployment scenarios: lightweight security, wormhole detection

Sprachübergreifend

193 245
Teilnahmepflicht

Werdende Mütter

Keine Gefährdungen vorliegend
Teilweise Gefährdungen vorliegend
Alternative Lehrveranstaltung
Gefährdungen vorliegend

Stillende Mütter

Keine Gefährdungen vorliegend
Teilweise Gefährdungen vorliegend
Alternative Lehrveranstaltung
Gefährdungen vorliegend

Begleitveranstaltungen

Übung zu Grundlagen der Informationstheoretischen Sicherheit

Werdende Mütter

Keine Gefährdungen vorliegend
Teilweise Gefährdungen vorliegend
Alternative Lehrveranstaltung
Gefährdungen vorliegend

Stillende Mütter

Keine Gefährdungen vorliegend
Teilweise Gefährdungen vorliegend
Alternative Lehrveranstaltung
Gefährdungen vorliegend