193
Compulsory

The data is ready to be exported to other systems

  • Most data can only be updated by department admins.
  • Secretaries or lecturers can still update texts.
  • Note: Manual room reservations may only be done for courses if their state is Published or In CM.

Inhalte

In this lecture, we will complement the theory of information-theoretic security (WS) with a similar framework of information-theoretic founded identity and privacy. In this course, we will define relevant key metrics to capture privacy and identity in an information-theoretic framework, which includes typical approaches such as differential privacy in the computer science literature. We shall apply this framework to derive fundamental performance limits of identity provision system, private information retrieval. A dedicated treatment is given to information-theoretic approach to multiparty computation over wireless channels and their related tradeoffs.
 
Keywords: Information-theoretic privacy and identity management, key metrics, differential privacy, fundamental inequalities and achievable performance regions, identity provision systems, private information retrieval schemes, privacy-preserving distributed multiparty computation/learning, computation & communication tradeoffs, distributed (cloud-)native AI/ML solutions
 

Course objectives 

Security is a prerequisite of modern wireless communication systems and user services. In this course we will introduce a new security paradigm for communication systems called physical layer security (PLS). PLS is an advanced method envisioned to meet the advanced requirements of future communication systems such as low latency ('fast security') and 'plug & secure' functionality. PLS is based on a well-defined mathematical theory exploiting the inherent properties of the wireless channel such as noise and fading. The goal of the course is to present the information-theoretic foundations of PLS including the definition of secrecy capacity definitions for the point-to-point wireless channel with an eavesdropper ('wiretap channel') as well as secret key agreement from stochastic channel measurements.

The course will also take on the attackers view and address potential attacks. Finally, several potential deployment scenarios such as the Internet of Things will be discussed.

Course Content

  • Overview of security schemes in communication systems: layer model, asymmetric/symmetric encryption, PLS classifications
  • Wiretap channel: basic definitions and assumptions, secrecy capacity, strong/weak secrecy, coding methods, MIMO channel, multiuser aspects
  • Secret key agreement: source models, key generation, common randomness, reciprocal wireless channel, correlation properties
  • Attacker models: passive/active, 'man in the middle', jamming
  • Deployment scenarios: lightweight security, wormhole detection

Cross-language

193 245
Compulsory

Expectant Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous

Nursing Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous

AncillaryCourses

Übung zu Grundlagen der Informationstheoretischen Sicherheit

Expectant Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous

Nursing Mother

Not dangerous
Partly dangerous
Alternative Course
Dangerous