Bachelor's Theses
[identification] Idnetification and Secrecy with PhysicallyUnclonableFunctions (PUFs)
PUF secrecy identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
From previous work we have a fairly efficient implementation based ReedMuller code which can be found at
Secrecy in this identification codes has also been implemented in unpublished work. Furthermore, the theoretical work on Identification with PUF's has been done in
The goal of the project will be to bridge the three topics and create practical and efficient secret identification codes in the PUF setting.
The working language will be in English.
Environment: this is a project in collaboration with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
Error Correcting Codes for Memories with (Partially) Defects
Linear Codes, Algebraic Codes, Error Correction , Masking Defects, Flash Memories, PhaseChange Memories
Description
For different applications, the demand for reliable memory solutions in particular for nonvolatile memories such as phasechange memories (PCMs) is rapidly increasing. PCM cells may become defective (also called stuck) either fully or partially if they fail in switching their states, and therefore these cells can only hold a single phase. In response to these defects, combined masking and errorcorrecting code constructions have been proposed, where masking is for hiding the defects while errorcorrecting is to compromise potential addedchannel errors. We want to investigate further code constructions such that less overall redundancy is required to handle these two types of errors. As an alternate, work for combined erasure errors and masking code constructions could be investigated.
Prerequisites
 Basic principle of Linear Algebra
 Channel Coding/Coding Theory
 Basic knowledge in Information Theory
Contact
M.Eng. Haider Al Kim
Doctoral Researcher
Technical University of Munich
Department of Electrical and Computer Engineering /
Coding and Cryptography (COD) Group
Email: haider.alkim@tum.de
Supervisor:
[identification] Implementation of identification with universal hash functions
universal hash identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
Master's Theses
Adapting Redundancy in Distributed Learning
Distributed Learning, Gradient Coding, Straggler tolerance
Description
In this project, we investigate the interplay between redundancy and straggler tolerance in distributed learning.
The setting is that of a main node distributing computational tasks to available workers as part of a machine learning algorithm, e.g., training a neural network. Waiting for all workers to return their computations suffers from the presence of stragglers, i.e., slow or unresponsive nodes. Mitigating the effect of the stragglers can be done through the use of redundancy or by leveraging the properties of the convergence of the machine learning algorithm.
The goal of this work is to compare when redundancy is needed. In this case, we aim to first analyze the convergence speed with and without redundancy. Then, we aim at design schemes that adaptively increase the redundancy to speed up the convergence.
Further reading:
R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 1, No. 1, May 2020. arXiv:1905.05383
S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Stochastic Gradient Descent for Fast and CommunicationEfficient Distributed Learning, preprint, arXiv:2208.03134.
Prerequisites
Knowledge in the following topics:
 Probability Theory
 Gradient descent and stochastic gradient descent
 Coding theory
Independence and motivation to work on a research topic
Knowledge of implementing neural networks is a plus
Contact
Dr. Rawad Bitar: rawad.bitar@tum.de
Supervisor:
Nonlinear Effects in MultiCore Fibers
nonlinearity, optical communications, mcf, multicore fibers
Description
Spacedivision multiplexing (SDM), which consists in exploiting multimode fibers (MMFs) or multicore fibers (MCFs) instead of single mode ones, is one of the future optical communications architectures to increase data rates and network planning flexibility. The nonlinear properties of MCFs are of primary interest in assessing the usefulness of SDM against the current network. With this thesis, the student has the chance to work on a stateoftheart topic in the field of optical communication systems, and progress quickly thanks to a tight (if desired) supervision. Would you be curious to know more about it? If so, just get in touch with me at paolo.carniello@tum.de (personal page https://www.ce.cit.tum.de/lnt/mitarbeiter/doktoranden/carniello/).
Prerequisites
some knowledge on optical communications systems (e.g., Optical Communication Systems or Simulation of Optical Communication Systems Lab)
some knowledge about communications engineering topics
Contact
paolo.carniello@tum.de
See https://www.ce.cit.tum.de/lnt/mitarbeiter/doktoranden/carniello/ for more info on the supervisor.
Supervisor:
Error Resilience in the NumberTheoretic Transform – PQC acceleration for safetycritical applications
postquantum cryptography, HW acceleration, number theoretic transform
Description
Asymmetric cryptography is a core component of modern communication infrastructure. The existence of a sufficiently large quantum computer threatens all algorithms currently in use and recent developments in this field motivate the field of postquantum cryptography (PQC), with the primary objective of developing secure and futureproof alternatives. To consolidate these efforts, the National Institute of Standards and Technology (NIST) is conducting a competition with the goal of selecting and standardizing the best available candidates.
In July 2022 four algorithms were selected, one Publickey Encryption and Keyestablishment Algorithms (KEM) and three Digital Signature Algorithms (DSA). Of these four algorithms, three (including the two recommended for general purpose applications) are from the class of latticebased schemes, i.e., they rely on difficult problems over lattices for their security.
The lattices in these schemes are represented by elements from a polynomial ring and arithmetic over this ring therefore plays a crucial role in their execution. To accelerate this arithmetic and, specifically, the multiplication of polynomials, the numbertheoretic transform (NTT) is used. This approach is a generalization of the multiplication algorithms based on the fast Fourier transform (FFT), that have been long established in fields like signal processing. Since a considerable part of the computational complexity of these algorithms lies in this NTT, it is a prime candidate for HW acceleration and many works in literature have proposed such accelerators.
While considerable efforts have been made to offer fast and lean NTT accelerators, the topic of fault resilience has received little attention so far. In safety critical applications, as common in automotive or industrial fields, this resilience is an important feature and needs to be provided by the HW. On the other hand, these fields are traditionally price sensitive, so the additional chip area required for these features should be minimal. However, current approaches, such as those introduced by Sarker et al. [1], impose a large area (or latency) overhead.
The goal of this thesis is to address this shortcoming. First, the approaches published in literature shall be evaluated with regard to the relevant performance figures (area overhead, latency, …). Then, new approaches for error resilience in NTT calculation shall be developed, either based on improving upon existing methods or by adapting methods for error resilience in the computation of FFTs.
References
[1] Sarker, Ausmita, Alvaro Cintas Canto, Mehran Mozaffari Kermani, and Reza Azarderakhsh. “Error Detection Architectures for Hardware/Software CoDesign Approaches of NumberTheoretic Transform.” IEEE Transactions on ComputerAided Design of Integrated Circuits and Systems, 2022, 1–1. https://doi.org/10.1109/TCAD.2022.3218614.
Prerequisites
Basic understanding of HW design
Good knowledge of algebra
Contact
georg.maringer@tum.de
Supervisor:
Efficient Block Propagation in Cryptocurrency Networks
Description
Cryptocurrencies like Bitcoin and Ethereum use a decentralized ledger called Blockchain to track transactions. Whenever a new block is added to the Blockchain, the change is spread through the network using a gossiplike protocol. This process is known as block propagation.
To increase scalability, the efficiency of block propagation is crucial. This thesis aims to explore the information theoretic limits of block propagation, derive realistic models based on real data, and investigate innovative and efficient techniques for block propagation.
The thesis will be conducted at the Institute of Communications and Navigation at DLR (German Aerospace Center) in Oberpfaffenhofen.
Prerequisites
Required qualifications are
 basic knowledge of information theory
 programming experience in Matlab, C, or python.
 Interest in cryptocurrencies.
Contact
Interested applicants may contact Dr. Francisco Lázaro via email at francisco.lazaroblasco@dlr.de.
Supervisor:
[identification] Idnetification and Secrecy with PhysicallyUnclonableFunctions (PUFs)
PUF secrecy identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
From previous work we have a fairly efficient implementation based ReedMuller code which can be found at
Secrecy in this identification codes has also been implemented in unpublished work. Furthermore, the theoretical work on Identification with PUF's has been done in
The goal of the project will be to bridge the three topics and create practical and efficient secret identification codes in the PUF setting.
The working language will be in English.
Environment: this is a project in collaboration with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
[quantum] Quantum Machine Learning for Communication
physical, layer, quantum, machine learning, nonlinear
Description
As part of an ongoing project with Huawei we are looking into quantum machine learning algorithms applied to decoding at the end of an optical fiber in the nonlinear regime.
So far we have tried only the quantum version of kmean clustering, however the goal is to test further quantum algorithms, in particular quantum support vector machines next, and their classical quantuminspired counterpart.
The projects will involve reading the literature on quantum machine learning algorithms and quantuminspired algorithms, find or come up with an implementation (this will involve the use of quantum libraries, in particular so far we have use qiskit), and benchmark the performance.
Prerequisites
Knowledge of quantum mechanics or quantum information is highly recommended.
Supervisor:
Error Correcting Codes for Memories with (Partially) Defects
Linear Codes, Algebraic Codes, Error Correction , Masking Defects, Flash Memories, PhaseChange Memories
Description
For different applications, the demand for reliable memory solutions in particular for nonvolatile memories such as phasechange memories (PCMs) is rapidly increasing. PCM cells may become defective (also called stuck) either fully or partially if they fail in switching their states, and therefore these cells can only hold a single phase. In response to these defects, combined masking and errorcorrecting code constructions have been proposed, where masking is for hiding the defects while errorcorrecting is to compromise potential addedchannel errors. We want to investigate further code constructions such that less overall redundancy is required to handle these two types of errors. As an alternate, work for combined erasure errors and masking code constructions could be investigated.
Prerequisites
 Basic principle of Linear Algebra
 Channel Coding/Coding Theory
 Basic knowledge in Information Theory
Contact
M.Eng. Haider Al Kim
Doctoral Researcher
Technical University of Munich
Department of Electrical and Computer Engineering /
Coding and Cryptography (COD) Group
Email: haider.alkim@tum.de
Supervisor:
[identification] Implementation of identification with universal hash functions
universal hash identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
[identification] Applications of Identification Codes in V2X Communications
sumo, ns3, ns3, vehicular, communication, identification, c++, ReedMuller
Description
As part of the NewCom Project, new communication paradigms are investigated from an experimental perspective in order to construct proofofconcept implementations that demonstrate the theoretical results obtained for PostShannon Communication schemes. In particular, this MSc thesis focuses on Identification Codes and their integration into a simulation environment where vehicular networks are modelled.
For this, the master student will first conduct a review of the stateoftheart use cases for identification in the scientific literature and in form of patents, with an emphasis on V2X communications. By using an opensource V2X implementation based on LDR’s Simulation of Urban Mobility (SUMO) framework integrated with ns3’s implementation of the ITSG5 and LTE standards and conducting simulation in specific scenarios, the student will gain a first impression of the performance of the system using traditional transmission schemes. The integration of existing implementation of identification codes culminates this thesis, where KPIs will be defined in order to compare the advantages of using identification instead of transmission in the context of V2X communications.
Details about the C++ tools/libraries
The software used for the simulation of the vehicular network communication is ezCar2x
which build on and integrates the NS3 (network simulation) and SUMO (traffic simulation) libraries
For the identification part and identification code based on ReedMuller codes needs to be reimplemented (work in progress) from Python into C++ using the Givaro library
Prerequisites

Knowledge of communications engineering, mobile communications, wireless channel models, signal processing, and channel coding techniques (experience in LTE/5G cellular networks is a plus)

Interest in novel communication concepts as well in their practical implementation

Software experience: MATLAB, C++ and Python (experience with ns3 or SUMO is a plus)

Comfortable working with Linux operative systems and distributed version control tools (e.g., gitlab)

Goaloriented and structured work style
Contact
To apply, Please send your application by email to Roberto Ferrara (roberto.ferrara@tum.de) and Luis TorresFigueroa (luis.torres.figueroa@tum.de) with the following documents:

Curriculum vitae

Academic transcript

Short motivation (0.5 – 1 page)
Supervisor:
[identification] Simulation and performance improvement of identification codes
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be speeding up the current implementations based on ReedSolomon and ReedMuller codes:
The coding will be in Python/Sagemath.
This work can accomodate multiple students.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Prerequisites
Nachrichtentechnik 2
Supervisor:
[security] Practical implementation of physicallayer semantic security
semantic, security, secrecy, programming, implementation
Description
The goal of this project is to implement in Python/Sagemath the security functions (at least one of four) described in https://arxiv.org/abs/2102.00983
Sagemath contains libraries for mosaics, BIBDs, etc, that can be used for the project.
Motivation:
There are various types of security definitions.
The mutual information based types, in increasing order of security requirement are
 Weak secresy asks that the average mutual information of the eavesdropper I(M:E)/n goes to 0 for a uniform message M (average here means averaged over the blocklength n, an additional average over M is implicit in the mutual information)
 Strong secrecy asks that the total mutual information I(M:E) goes to 0,
 Semantic security asks that the total mutual informaiton I(M:E) goes to 0 for any distribution of the message M (and thus in particular for all distributions that pick any of two chosen messages with 1/2 probabilty)
Then there are the almostequivalent respective indistiguishablity types of security requirements (below PQ_1 is the statistical distance and Exp_M is expectation value over M)
 average indistinguishability 1/n Exp_M  P_{EM}  P_E _1 for a uniform message M goes to 0 (again average refers over the blocklegth n, clearly there is also the average over M)
 total indistiguishability Exp_M  P_{EM}  P_E _1 for a uniform message M goes to 0
 indistinguishability P_{Em}  P_{Em'}_1 for any two messages m and m' goes to 0.
Each of the indistiguishabilities can also be written using KL digvergence instead of statistical distance, in which case the conditions are exactly equivalent to their mutual information versions.
Strong secrecy is the standard security requirement considered in informationtheoretic security, while semantic security is the minimum requirement considered in computational security.
Informationtheoretic (physicallayer) security differs from computational security in that the secrecy is guaranteed irrespective of the power of the adversary, while in computational security E is computationally bounded. Computational security also assumes that the message is at least of a certain length for the schemes to work, and thus if the message to be secured is too small it needs to be padded to a larger message.
In practice, information theoretic security is expensive, because the messages that can be secured can be only as long as the keys that can be generated. However, in identification only a very small part of the message needs to be secured, which in computational security triggers padding and thus waste, but on the other side makes informationtheoretic security accessible and not so expensive.
At the same time, the security of identification implicitly requires semantic security. It has been known for a while that hash functions provide informationtheoretic strong secrecy. However, because the standard for informationtheoretic security has been strong secrecy, before https://arxiv.org/abs/2102.00983 no efficient functions where known to provide informationtheoretic semantic security.
We need an implementation of these type of functions so that we can integrate informationtheoretic security into our identification project.
Supervisor:
[quantum] Realignment criterion and upper bounds in deviceindependent QKD
Description
This paper uses the partial transpose as a tool to derive upper bounds on deviceindependent QKD
https://arxiv.org/abs/2005.13511
In this project the goal is to try to generalize the above to the other tools like the reallignment criterion:
https://arxiv.org/abs/quantph/0205017
https://arxiv.org/abs/0802.2019
Prerequisites
basics of quantum information/quantum formalism
Supervisor:
[quantum] Semantic security of infinitedimensional classicalquantum channels
Description
Generalize semantic security of classicalquantum channels to infinite dimensional channel (not necessarily gaussian)
 [1] finite dimensional classicalquantum case
https://arxiv.org/abs/2001.05719  finite and infinite dimensional classical case
https://arxiv.org/abs/1811.07798  [this subpoint can be a project by itself] the finite dimesional case needs to be recast into smoothmax information (instead than Lemma 5.7 of [1]) as the classical case does, this paper proves properties of the smoothmaxinf in finite dimension that we would need for that
https://arxiv.org/abs/2001.05719  papers regarding the capacity for infinite dimensional channels
http://arxiv.org/abs/quantph/9912067v1
http://arxiv.org/abs/quantph/0408009v3
http://arxiv.org/abs/quantph/0408176v1
Prerequisites
quantum information theory
Supervisor:
[quantum] Asymptotic continuity of restricted quantum relative entropies under general channels
quantum, relative entropy, Pinsker, reverse, inequality, information thoery, asymptotic, continuity
Description
Asypmtotic continuity is a property in the form of inequalities (classically known also as inequalities of the reversePinker type) that is necessary to prove upper bounds on operational capacities.
The (quantum) relative entropy (also known as quantum divergence and classically also known as KullbacktLeibler divergence), can be used to define various entanglment measures many of which have a proven asymptotic continuity.
Of particular interest are the restricted quantum relative entropies defined by Marco Piani (https://arxiv.org/abs/0904.2705), many of which satisfy asymptotic continuity (A.S.)
 https://arxiv.org/abs/quantph/9910002
 https://arxiv.org/abs/quantph/0203107
 https://arxiv.org/abs/quantph/0507126
 https://arxiv.org/abs/1210.3181
 https://arxiv.org/abs/1507.07775
 https://arxiv.org/abs/1512.09047
In the above there are maybe 23 different proof styles.
We can group the results in the above as follows:
 A.S. for entropy, conditional entropies, mutual information, conditional mutual information
 A.S. for relative entropies with infimum over states on the second argument
 A.S. relative entropies with infimum over state *and maximization over measurement channels*
The goal of the project is to generalize the last case to asymptotic continuity for relative entropies with infimum over state and maximization over *general* channels.
 Partial results toward this goal can be found in the appendix of my PhD thesis: http://web.math.ku.dk/noter/filer/phd18rf.pdf
 Such a result would have immediate applications to this paper: https://arxiv.org/abs/1801.02861
Possible new proof directions are
 using Renyi αrealtive entropies with the limit α>1
 using Kim's operator inequality from
https://arxiv.org/abs/1210.5190
to get an operator inequality looking like a reverse strong subadditivity (see https://www.youtube.com/watch?v=P3xI1u1Y2s for a good overview and in particular at minute 31:20 for the reverse SSA)
Prerequisites
Knowledge of quantum information is highly recommended/required.
Knowledge of matrix analysis will be a strong advantage.
Contact
roberto.ferrara@tum.de
Supervisor:
[quantum] Practical protocols for quantum synchronization in classical network
quantum, network, synchronization
Description
relevant papers
https://arxiv.org/abs/1310.6043
https://arxiv.org/abs/1304.5944
https://arxiv.org/abs/1310.6045
https://arxiv.org/abs/1703.05876
https://arxiv.org/abs/1303.6357
background papers
https://ieeexplore.ieee.org/document/7509657
Prerequisites
Knowledge of quantum theory as provided by the course Algorithms in Quantum Theory or similar
Supervisor:
[quantum] Entanglementmeasures upper bounds on deviceindependent distillable key
quantum, qkd, entanglement
Description
The goal of this work is to try to upper bound the deviceindependent distillable key in terms of locally restricted relative entropy of entanglement (an entanglement measure).
The following are relevant works/articles
 works toward even *a definition* of device independent distillable key
https://arxiv.org/abs/2005.13511
https://arxiv.org/abs/2005.12325
https://arxiv.org/abs/1810.05627  works relating distillable entanglement and distillable key to locally restricted relative entropy measures
https://arxiv.org/abs/1609.04696
https://arxiv.org/abs/1402.5927  the first definition of restricted relative entropies
https://arxiv.org/abs/0904.2705  important properties of restricted relative entropies, and some overview of entanglement measures
https://arxiv.org/abs/1210.3181  my PhD thesis
http://web.math.ku.dk/noter/filer/phd18rf.pdf
Prerequisites
Strong background in quantum theory is required, preferably in quantum information theory, which is not covered by the course Algorithms in Quantum Theory
Supervisor:
Research Internships (Forschungspraxis)
Adapting Redundancy in Distributed Learning
Distributed Learning, Gradient Coding, Straggler tolerance
Description
In this project, we investigate the interplay between redundancy and straggler tolerance in distributed learning.
The setting is that of a main node distributing computational tasks to available workers as part of a machine learning algorithm, e.g., training a neural network. Waiting for all workers to return their computations suffers from the presence of stragglers, i.e., slow or unresponsive nodes. Mitigating the effect of the stragglers can be done through the use of redundancy or by leveraging the properties of the convergence of the machine learning algorithm.
The goal of this work is to compare when redundancy is needed. In this case, we aim to first analyze the convergence speed with and without redundancy. Then, we aim at design schemes that adaptively increase the redundancy to speed up the convergence.
Further reading:
R. Bitar, M. Wootters and S. El Rouayheb, Stochastic Gradient Coding for Straggler Mitigation in Distributed Learning, IEEE Journal on Selected Areas in Information Theory (JSAIT), Vol. 1, No. 1, May 2020. arXiv:1905.05383
S. Kas Hanna, R. Bitar, P. Parag, V. Dasari and S. El Rouayheb, Adaptive Stochastic Gradient Descent for Fast and CommunicationEfficient Distributed Learning, preprint, arXiv:2208.03134.
Prerequisites
Knowledge in the following topics:
 Probability Theory
 Gradient descent and stochastic gradient descent
 Coding theory
Independence and motivation to work on a research topic
Knowledge of implementing neural networks is a plus
Contact
Dr. Rawad Bitar: rawad.bitar@tum.de
Supervisor:
Nonlinear Effects in MultiCore Fibers
nonlinearity, optical communications, mcf, multicore fibers
Description
Spacedivision multiplexing (SDM), which consists in exploiting multimode fibers (MMFs) or multicore fibers (MCFs) instead of single mode ones, is one of the future optical communications architectures to increase data rates and network planning flexibility. The nonlinear properties of MCFs are of primary interest in assessing the usefulness of SDM against the current network. With this thesis, the student has the chance to work on a stateoftheart topic in the field of optical communication systems, and progress quickly thanks to a tight (if desired) supervision. Would you be curious to know more about it? If so, just get in touch with me at paolo.carniello@tum.de (personal page https://www.ce.cit.tum.de/lnt/mitarbeiter/doktoranden/carniello/).
Prerequisites
some knowledge on optical communications systems (e.g., Optical Communication Systems or Simulation of Optical Communication Systems Lab)
some knowledge about communications engineering topics
Contact
paolo.carniello@tum.de
See https://www.ce.cit.tum.de/lnt/mitarbeiter/doktoranden/carniello/ for more info on the supervisor.
Supervisor:
Strong Coupling Multimode Fibers
Multimode fibers, Spacedivision multiplexing
Description
Spacedivision multiplexing (SDM), which consists in exploiting multimode (MMF) or multicore fibers instead of single mode ones, is one of the future architectures to increase data rates and network planning flexibility. A desired working condition for SDM is the so called strongcoupling linear regime, which is however not intrinsically achievable in common MMFs. With this topic, the student has the chance to investigate if it would be achievable with some new design. If you are curious about it, just send a mail to paolo.carniello@tum.de.
Prerequisites
Basics of Optical Communication Systems (see https://www.ce.cit.tum.de/en/lnt/teaching/lectures/opticalcommunicationsystems/)
Contact
paolo.carniello@tum.de
Supervisor:
Neural NetworkBased Signal Predistortion for Direct Detection Systems
Description
During the internship, the student will be researching the application of Neural Networkbased signal predistortion to mitigate the effects of fiber chromatic dispersion in direct detection systems.
Prerequisites
 basic Python skills beneficial
Supervisor:
Distributed Noise Generation for Secure OvertheAir Computation with Applications in Federated Learning
OvertheAir (OtA) computation is a promising approach with the potential to drastically reduce the communication overhead of wireless distributed dataprocessing systems (e.g. Federated Learning). Since this method, however, is prone to eavesdropping, artificial noise can be employed to secure the communication. An open problem however, is the distributed design of artifical noise among different users.
Description
Novel use cases for mobile communication networks include the aggregation of large amounts of data, which is stored in a distributed manner across network users. For instance, Federated Learning requires the aggregation of machine learning model updates from contributing users.
OvertheAir (OtA) computation is an approach with the potential to drastically reduce the communication overhead of wireless distributed dataprocessing systems (e.g. Federated Learning). It exploits the multipleaccess property and linearity of the wireless channel to compute sums of preprocessed data by the channel. This important property at the same time opens great opportunities for eavesdroppers to learn about the transmitted signal. If the legitimate receiver shall have exclusive access to the computation result, it is crucial to employ additional security measures.
Artificial noise can be employed to secure the communication. This noise is either generated by dedicated users jamming the communication [3], or by jointly designing the noise contribution of each user, [1][2]. The latter approach makes it possible to minimize the distortion at the legitimate receiver, but requires a centrally coordinated noise design. Therefore, an open problem is how to allow for the distributed design of artifical noise.
[1] Maßny, Luis, and Antonia WachterZeh. "Secure OvertheAir Computation using ZeroForced Artificial Noise." arXiv preprint arXiv:2212.04288 (2022).
[2] Liao, Jialing, Zheng Chen, and Erik G. Larsson. "OvertheAir Federated Learning with Privacy Protection via Correlated Additive Perturbations." arXiv preprint arXiv:2210.02235 (2022).
[3] Yan, Na, et al. "Toward Secure and Private OvertheAir Federated Learning." arXiv preprint arXiv:2210.07669 (2022).
Prerequisites
 basic knowledge in statistics and estimation theory
 basic knowledge about linear wireless channels
Supervisor:
[identification] Idnetification and Secrecy with PhysicallyUnclonableFunctions (PUFs)
PUF secrecy identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
From previous work we have a fairly efficient implementation based ReedMuller code which can be found at
Secrecy in this identification codes has also been implemented in unpublished work. Furthermore, the theoretical work on Identification with PUF's has been done in
The goal of the project will be to bridge the three topics and create practical and efficient secret identification codes in the PUF setting.
The working language will be in English.
Environment: this is a project in collaboration with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
MABBased Efficient Distributed ML on the Cloud
Distributed Machine Learning (ML), MultiArmed Bandits (MABs), Cloud Simulations (AWS, GCP, ...)
Description
We consider the problem of running a distributed machine learning algorithm on the cloud. This imposes several challenges. In particular, cloud instances may have different performances/speeds. To fully leverage the performance of the instances, we want to characterize their speed and potentially use the fastest ones. To explore the speed of the instances while exploiting them (assigning computational tasks), we use the theory of multiarmed bandits (MABs).
The goal of the research intership is to start by implementing existing theoretical algorithms [1] and possibly adapting them based on the experimental observations.
[1] M. Egger, R. Bitar, A. WachterZeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial MultiArmed Bandits, submitted to IEEE Journal on Selected Areas in Communications (JSAC), 2022.
Prerequisites
 Information Theory
 Machine Learning Basics
 Python (Intermediate Level)
Supervisor:
[quantum] Quantum Machine Learning for Communication
physical, layer, quantum, machine learning, nonlinear
Description
As part of an ongoing project with Huawei we are looking into quantum machine learning algorithms applied to decoding at the end of an optical fiber in the nonlinear regime.
So far we have tried only the quantum version of kmean clustering, however the goal is to test further quantum algorithms, in particular quantum support vector machines next, and their classical quantuminspired counterpart.
The projects will involve reading the literature on quantum machine learning algorithms and quantuminspired algorithms, find or come up with an implementation (this will involve the use of quantum libraries, in particular so far we have use qiskit), and benchmark the performance.
Prerequisites
Knowledge of quantum mechanics or quantum information is highly recommended.
Supervisor:
[identification] Implementation of identification with universal hash functions
universal hash identification
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Supervisor:
[identification] Simulation and performance improvement of identification codes
Description
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be speeding up the current implementations based on ReedSolomon and ReedMuller codes:
The coding will be in Python/Sagemath.
This work can accomodate multiple students.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Prerequisites
Nachrichtentechnik 2
Supervisor:
[quantum] Realignment criterion and upper bounds in deviceindependent QKD
Description
This paper uses the partial transpose as a tool to derive upper bounds on deviceindependent QKD
https://arxiv.org/abs/2005.13511
In this project the goal is to try to generalize the above to the other tools like the reallignment criterion:
https://arxiv.org/abs/quantph/0205017
https://arxiv.org/abs/0802.2019
Prerequisites
basics of quantum information/quantum formalism