https://www.dagstuhl.de/18511

16. – 21. Dezember 2018, Dagstuhl Seminar 18511

Algebraic Coding Theory for Networks, Storage, and Security

Organisatoren

Martin Bossert (Universität Ulm, DE)
Eimear Byrne (University College Dublin, IE)
Antonia Wachter-Zeh (TU München, DE)

Auskunft zu diesem Dagstuhl Seminar erteilen

Susanne Bach-Bernhard zu administrativen Fragen

Michael Gerke zu wissenschaftlichen Fragen

Dokumente

Programm des Dagstuhl Seminars (Hochladen)

(Zum Einloggen bitte Seminarnummer und Zugangscode verwenden)

Motivation

The main aim of coding theory is to ensure reliable data transmission and data storage. Data is encoded, introducing redundancy, which is required for resilience to errors, malicious interference and packet loss. In addition, code-based cryptography can ensure privacy of the data and provide a means for authentication of the users.

The purpose of this Dagstuhl Seminar is bringing together young and experienced researchers with backgrounds in coding theory, network coding, storage coding and code-based security. The discussions will address similarities and differences between the various methods for the three applications (network coding, storage coding, security).

A major paradigm shift in coding theory occurred with the advent of network coding. The seminal work of Ahlswede et al in 2000 has shown that in order to reach network capacity, the transmitted data packets must be algebraically combined at intermediate nodes of the network. The unpredictability and/or complex topology of networks means that traditional coding methods must be drastically revised to be effective. Rank-metric codes have proved to offer many solutions in the network coding domain, both for error propagation control and wire-tap protection. Coded caching techniques, exploiting low congestion periods of data traffic and local storage hubs point to vast potential in content delivery services for large files such as multi-media.

In Today’s era of cloud and distributed storage, a central problem is how to efficiently maintain reliable storage of data. In multi-disk systems, if a disk fails, data must be recoverable from the remaining stored data, to provide reliability. On one hand it is empirically clear that disk failure is the norm rather than an exception, so that redundancy is a current storage requirement; on the other hand, the sheer scale of data involved means that redundancy must be added as efficiently as possible. To minimize the overhead required to ensure a certain reliability, it is proposed that data should be stored redundantly by employing coding.

An important aspect of user access in distributed storage is private information retrieval so that users who are remotely accessing files can do so without storage servers knowing what they have accessed. Attempts to efficiently solve this problem come from coding theory and combinatorics.

Privacy and security are a major challenge in our modern connected world. Schemes that address the confidentiality of messages as well as the integrity of the data are required. Public-key cryptography is the foundation of multi-party communication as well as for key exchange of symmetric cryptosystems. With the threat of a capable quantum computer, post-quantum secure systems have recently turned into the research focus, especially for devices that are hard to update and have very long-life cycles. As soon as a quantum computer will become available, traditional public-key cryptosystems such as RSA will become insecure. Code-based cryptography provides post-quantum secure public-key systems.

License
  Creative Commons BY 3.0 DE
  Martin Bossert, Eimear Byrne, and Antonia Wachter-Zeh

Dagstuhl Seminar Series

Classification

  • Data Structures / Algorithms / Complexity
  • Networks
  • Security / Cryptology

Keywords

  • Distributed storage
  • Network coding
  • Coding theory
  • Cryptography
  • Privacy

Buchausstellung

Bücher der Teilnehmer 

Buchausstellung im Erdgeschoss der Bibliothek

(nur in der Veranstaltungswoche).

Dokumentation

In der Reihe Dagstuhl Reports werden alle Dagstuhl-Seminare und Dagstuhl-Perspektiven-Workshops dokumentiert. Die Organisatoren stellen zusammen mit dem Collector des Seminars einen Bericht zusammen, der die Beiträge der Autoren zusammenfasst und um eine Zusammenfassung ergänzt.

 

Download Übersichtsflyer (PDF).

Publikationen

Es besteht weiterhin die Möglichkeit, eine umfassende Kollektion begutachteter Arbeiten in der Reihe Dagstuhl Follow-Ups zu publizieren.

Dagstuhl's Impact

Bitte informieren Sie uns, wenn eine Veröffentlichung ausgehend von
Ihrem Seminar entsteht. Derartige Veröffentlichungen werden von uns in der Rubrik Dagstuhl's Impact separat aufgelistet  und im Erdgeschoss der Bibliothek präsentiert.