Key Generation and Secure Coding in Communications and Private Learning
dc.contributor.author | Aldaghri, Nasser | |
dc.date.accessioned | 2022-05-25T15:27:36Z | |
dc.date.available | 2022-05-25T15:27:36Z | |
dc.date.issued | 2022 | |
dc.date.submitted | 2022 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/172704 | |
dc.description.abstract | The increasingly distributed nature of many current and future technologies has introduced many challenges for devices designed for such settings. Devices operating in such environments, such as Internet-of-Things (IoT), medical devices, connected vehicles, etc., typically have limited computational power and rely on batteries to operate. Therefore, efficiency is a paramount requirement for any algorithm designed to be implemented on these devices. Furthermore, these devices typically generate and collect huge amounts of extremely sensitive and personal data, such as health-related data, behavior-related data, etc. As a result, there is a need for security and privacy protections to guard against various attacks. Additionally, since these devices are typically resource-constrained, any algorithm or protocol needs to be efficient to enable its implementation on such devices. Efficient security and privacy solutions are essential to cope with, as well as enable, high deployment rate of such devices for various sensitive applications. In this dissertation, efficient solutions for protecting the security and privacy of data generated by such devices are explored. Low-complexity protocols for generating secret keys in static environments, along with a formulation of threshold-secure coding with a shared key and corresponding coding schemes are presented. Additionally, algorithms for coded machine unlearning for regression problems are presented, as well as a new setup and algorithm for federated learning with opt-out differential privacy are presented and evaluated. | |
dc.language.iso | en_US | |
dc.subject | Security | |
dc.subject | Privacy | |
dc.subject | Internet-of-Things (IoT) | |
dc.subject | Key generation | |
dc.subject | Threshold security | |
dc.subject | Federated Learning | |
dc.title | Key Generation and Secure Coding in Communications and Private Learning | |
dc.type | Thesis | |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | Electrical and Computer Engineering | |
dc.description.thesisdegreegrantor | University of Michigan, Horace H. Rackham School of Graduate Studies | |
dc.contributor.committeemember | Mahdavifar, Hessam | |
dc.contributor.committeemember | Chowdhury, Mosharaf | |
dc.contributor.committeemember | Pradhan, S Sandeep | |
dc.contributor.committeemember | Stark, Wayne E | |
dc.subject.hlbsecondlevel | Electrical Engineering | |
dc.subject.hlbtoplevel | Engineering | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/172704/1/aldaghri_1.pdf | |
dc.identifier.doi | https://dx.doi.org/10.7302/4733 | |
dc.identifier.orcid | 0000-0003-4308-8631 | |
dc.identifier.name-orcid | Aldaghri, Nasser; 0000-0003-4308-8631 | en_US |
dc.working.doi | 10.7302/4733 | en |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.