Secure Multi-Source Key Dissemination Using Network Coding
A secure key-cast network design to ensure positive-rate key dissemination while preventing non-terminal nodes from accessing information.
Background:
In cryptographic applications, disseminating a secret key among network nodes while ensuring that non-terminal nodes do not gain any information about the key is a critical challenge. This concept,...
Published: 11/12/2024
|
Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology
|
Rank-1 Linear Relay Codes Empowering Low-Power Wireless Communication
This invention introduces an innovative, high-dimensional relay coding technique that significantly enhances the efficiency and reliability of data transmission in relay channels, particularly for low-power wireless devices.
Background:
In the realm of wireless communication, the efficient transmission of data in environments constrained by power...
Published: 6/13/2024
|
Inventor(s): Michael Langberg, Michelle Effros, Oliver Kosut
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Wireless, Technology Classifications > Information Technology, Technology Classifications > Energy Conservation
|
Methods for Multicast Key-Capacity
A means of protecting a multi-source multi-terminal noiseless network, with key-dissemination in which secret key K is multicasted from the network sources to its terminals.
Background:
A key-dissemination communication protocol is one in which a key K, which is at times secret, is shared among a collection of users as a prelude to future communication...
Published: 6/20/2024
|
Inventor(s): Michael Langberg, Michelle Effros
Keywords(s): Featured, Technologies
Category(s): Campus > University at Buffalo, Technology Classifications > Computers, Technology Classifications > Information Technology
|
Communication Efficient Secret Sharing
Methods for distributed data storage that enable secret sharing.
A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. The key idea to reduce communication is to let the user...
Published: 2/2/2024
|
Inventor(s): Michael Langberg, Wentao Huang, Joerg Kliewer, Jehoshua Bruck
Keywords(s): Technologies
Category(s): Technology Classifications > Information Technology, Technology Classifications > Computers, Campus > University at Buffalo
|
Polar Coding for Noisy Write-Once Memories
Techniques are disclosed for generating codes for representation of data in memory devices that may avoid the block erasure operation in changing data values.
Write-once memory is a model for data-storage devices, where a set of binary cells are used to store data, and the cell levels can only increase when the data is rewritten. The WOM model was...
Published: 2/2/2024
|
Inventor(s): Michael Langberg, Eyal En Gad, Yue Li, Jehoshua Bruck, Joerg Kliewer, Anxiao Jiang
Keywords(s): Technologies
Category(s): Technology Classifications > Computers, Campus > University at Buffalo, Technology Classifications > Electronics
|