Bachelorarbeiten
Private and Secure Federated Learning
Beschreibung
In federated learning, a machine learning model shall be trained on private user data with the help of a central server, the socalled federator. This setting differs from other machine learning settings in that the user data shall not be shared with the federator for privacy reasons and/or to decrease the communication load of the system.
Even though only intermediate results are shared, extra care is necessary to guarantee data privacy. An additional challenge arises if the system includes malicious users that breach protocol and send corrupt computation results.
The goal of this work is to design, implement and analyze coding and informationtheoretic solutions for privacy and security in federated learning.
Voraussetzungen
 Coding Theory (e.g., Channel Coding)
 Information Theory
 Machine Learning Basics
Betreuer:
[identification] PseudoRandom Identification
random pseudo identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
One advantage can be gained by using pseudo randomness to generate both the input and the code itself.
Your task will be implementing the identification codes described in the attached pdf (an english translation of a paper published in russian in a russian journal) aiming at the fastest implementation and smallest collisions, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI from TUM and CeTI from TU Dresden, the latter having already some preliminary implementation of pseudorandom identification using various pseudorandom generators. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
Error Correcting and Masking Codes for Memories with (Partially) Defects
Linear Codes, Algebraic Codes, Error Correction , Masking Defects, Flash Memories, PhaseChange Memories
Beschreibung
For different applications, the demand for reliable memory solutions in particular for nonvolatile memories such as phasechange memories (PCMs) is rapidly increasing. PCM cells may become defective (also called stuck) either fully or partially if they fail in switching their states, and therefore these cells can only hold a single phase. In response to these defects, combined masking and errorcorrecting code constructions have been proposed, where masking is for hiding the defects while errorcorrecting is to compromise potential addedchannel errors. We want to investigate further code constructions such that less overall redundancy is required to handle these two types of errors. As an alternate, work for combined erasure errors and masking code constructions could be investigated.
Voraussetzungen
 Basic principle of Linear Algebra
 Channel Coding/Coding Theory
 Basic knowledge in Information Theory
Kontakt
M.Eng. Haider Al Kim
Doctoral Researcher
Technical University of Munich
Department of Electrical and Computer Engineering /
Coding and Cryptography (COD) Group
Email: haider.alkim@tum.de
Betreuer:
Deterministic KIdentification For The DMC With Power Constraint
Identification via channel, Kidentification, deterministic codes
Kidentification capacity of a DMC is derived.
Beschreibung
The student attempt to study the deterministic identification capacity
of a DMC subject to power constraint and generalize it for the Kidentification.
Voraussetzungen
Basics of Information Theory and Channel Coding.
Familiarity with the fundamentals of Identification Theory
Betreuer:
[identification] Implementation of identification with universal hash functions
universal hash identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
Error Correction for DNABased Data Storage
Beschreibung
DNAbased data storage is a novel approach for long term digital data archiving.
Due to the unique nature of writing and reading DNA, the channel associated with these processes is still realtively poor understood and varies over different synthesis (writing) and sequencing (reading) technologies. The task of the student is to analyze different sequencing methods and the associated errors and formulate associated channel models. Based on these models, errorcorrecting schemes shall be evaluated.
Voraussetzungen
 Basic principles of stochastic and algebra
 Channel Coding
 Information Theory
Betreuer:
Masterarbeiten
LowDensity CoverMetric Codes
Coding, Error Correction
Probabilistic error correction in the cover metric
Beschreibung
A common assumption for the construction of error correcting codes is that errors occur independently.
However, in many applications errors are actually highly correlated.
Coding in the covermetric considers correlated errors which occur as 2dimensional burst errors.
Such errors can be corrected using rankmetric codes.
Originally Gabidulin codes were proposed for this.
In [1], lowrank parity check (LRPC) codes are introduced, which utilize a probabilistic decoding procedure.
The goal of the master thesis is to
 apply LRPC codes to the covermetric
 derive expressions on the success probability of the decoding by modifying the existing results for the rank metric
 check these results using simulations
Depending on personal preference, this basic idea will be extended into different directions:
 consider interleaved scenario as in [2]
 consider a modified construction, which utilizes the additional structure of covermetric errors compared to rankmetric errors (cf. [3])
If you are interested, please write an email, then we'll discuss the details.
[1] Aragon, Gaborit, Hauteville, Ruatta, Zemor, "Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography", https://arxiv.org/abs/1904.00357
[2] Renner, Jerkovits, Bartz, "Efficient Decoding of Interleaved LowRank ParityCheck Codes", https://arxiv.org/abs/1908.10839
[3] Bitzer, Renner, WachterZeh, Weger, "Generic Decoding in the Cover Metric", https://arxiv.org/abs/2205.12738
Voraussetzungen
Channel coding
Betreuer:
SumCover Metric
Cryptography, Coding Theory, Postquantum
Information set decoding in the sumcover metric and density results
Beschreibung
Due to the recent advances in quantum computers, the search for cryptosystems that survive quantum attacks is of great interest. There are many open questions and challenges.
Generalizing the paper https://arxiv.org/pdf/2205.12738.pdf we can consider the sumcover metric and its applications to cryptography. More in detail, this would possibly contain:
 computing the GilbertVarshamov bound,
 how likely it is that codes attain the GilbertVarshamov bound,
 the Singleton bound,
 how likely it is that a code attains the Singleton bound,
 Information set decoding algorithms (cf. https://arxiv.org/abs/2001.04812).
If you are interested, please write an email, then we'll discuss the details.
Voraussetzungen
Security in communications and storage
Channel coding
Betreuer:
Private and Secure Federated Learning
Beschreibung
In federated learning, a machine learning model shall be trained on private user data with the help of a central server, the socalled federator. This setting differs from other machine learning settings in that the user data shall not be shared with the federator for privacy reasons and/or to decrease the communication load of the system.
Even though only intermediate results are shared, extra care is necessary to guarantee data privacy. An additional challenge arises if the system includes malicious users that breach protocol and send corrupt computation results.
The goal of this work is to design, implement and analyze coding and informationtheoretic solutions for privacy and security in federated learning.
Voraussetzungen
 Coding Theory (e.g., Channel Coding)
 Information Theory
 Machine Learning Basics
Betreuer:
[identification] PseudoRandom Identification
random pseudo identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
One advantage can be gained by using pseudo randomness to generate both the input and the code itself.
Your task will be implementing the identification codes described in the attached pdf (an english translation of a paper published in russian in a russian journal) aiming at the fastest implementation and smallest collisions, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI from TUM and CeTI from TU Dresden, the latter having already some preliminary implementation of pseudorandom identification using various pseudorandom generators. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
[quantum] Quantum Machine Learning for Communication
physical, layer, quantum, machine learning, nonlinear
Beschreibung
As part of an ongoing project with Huawei we are looking into quantum machine learning algorithms applied to decoding at the end of an optical fiber in the nonlinear regime.
So far we have tried only the quantum version of kmean clustering, however the goal is to test further quantum algorithms, in particular quantum support vector machines next, and their classical quantuminspired counterpart.
The projects will involve reading the literature on quantum machine learning algorithms and quantuminspired algorithms, find or come up with an implementation (this will involve the use of quantum libraries, in particular so far we have use qiskit), and benchmark the performance.
Voraussetzungen
Knowledge of quantum mechanics or quantum information is highly recommended.
Betreuer:
Successive Cancellation Inactivation Decoding over qary Erasure Channels
Beschreibung
The student is expected to understand a recent decoding algorithm called successive cancellation inactivation (SCI) decoding [1] and extend it towards qary erasure channels.
[1] https://ieeexplore.ieee.org/abstract/document/9174226
Voraussetzungen
The student is expected to have a good understanding of linear algebra and be able to implement via Matlab or Julia. The following courses are beneficial:
 Information Theory
 Channel Coding
 Channel Codes for Iterative Decoding
Kontakt
mustafa.coskun@tum.de
Betreuer:
Information freshness in nextgeneration IoT networks
Beschreibung
Kontakt
andrea.munari@dlr.de
Betreuer:
Error Correcting and Masking Codes for Memories with (Partially) Defects
Linear Codes, Algebraic Codes, Error Correction , Masking Defects, Flash Memories, PhaseChange Memories
Beschreibung
For different applications, the demand for reliable memory solutions in particular for nonvolatile memories such as phasechange memories (PCMs) is rapidly increasing. PCM cells may become defective (also called stuck) either fully or partially if they fail in switching their states, and therefore these cells can only hold a single phase. In response to these defects, combined masking and errorcorrecting code constructions have been proposed, where masking is for hiding the defects while errorcorrecting is to compromise potential addedchannel errors. We want to investigate further code constructions such that less overall redundancy is required to handle these two types of errors. As an alternate, work for combined erasure errors and masking code constructions could be investigated.
Voraussetzungen
 Basic principle of Linear Algebra
 Channel Coding/Coding Theory
 Basic knowledge in Information Theory
Kontakt
M.Eng. Haider Al Kim
Doctoral Researcher
Technical University of Munich
Department of Electrical and Computer Engineering /
Coding and Cryptography (COD) Group
Email: haider.alkim@tum.de
Betreuer:
Automotive ECU  Crypto u. Security
externe Masterarbeit, automotive, crypto and security
Beschreibung
Liebe Studierende!
Es besteht die Möglichkeit Ihre Masterarbeit im Ingenieursbüro Filgis zu absolvieren. Ich würde diese Arbeit von Universitätsseite her betreuen. Falls Sie sich für das Thema interessieren, melden Sie sich bitte bei mir und/oder Herrn Filgis per Mail.
Die Themenbeschreibung finden Sie in der zum Download bereitgestellten pdfDatei. Alternativ finden Sie den Text auch unterhalb nochmal.
Mit freundlichen Grüßen
Georg Maringer
Gegründet im April 2021 ist das Ingenieurbüro Filgis ein junges Unternehmen. Der Fokus liegt auf embedded Entwicklung aller Art. Sei es Hardware, sei es Software, sei es FPGA. Der Anspruch ist
Kunden optimal zu beraten und mit außergewöhnlicher Geschwindigkeit und Qualität zum Erfolg
zu verhelfen.
Sie sind Student und haben einiges an Erfahrung im embedded Bereich vorzuweisen? Sie haben Lust an einer Herausforderung im Automotive Crypto / Security Bereich zu arbeiten? Ihr Auftreten
ist professionell und sie arbeiten auch unter Druck selbstständig und effizient?
Sie wissen eine überdurchschnittliche Vergütung zu schätzen?
Es geht um einen embedded Rechner innerhalb der Produktionslinie für automotive Steuergeräte. Die Steuergeräte kommunizieren zu diesem Zeitpunkt nur noch verschlüsselt über CAN, LIN (u. eventuell Ethernet). Die nötigen Schlüssel kommen direkt vom OEM. Denkbar ist ein MasterSchlüssel der bei aktiver Verbindung zum OEM Gültigkeit hat, oder auch z.B. 1000 EinmalSchlüssel die per USBStick übertragen werden. Ziele dieser Arbeit sollen sein:
? Herausarbeiten der Anforderungen bzgl. Crypto / Security exemplarisch für eine
Produktionslinie durch
? Internetrecherche zum Stand der Industrie (Vector, AutoSAR…)
? Gespräche mit allen Stakeholdern dieser Linie
? Umsetzen einer technischen Lösung
? Planung der Architektur für embedded (C, POSIX)
? Implementierung und Test
? Performance Review
Ich freue mich auf Ihre überzeugende Bewerbung!
Simon Filgis
simon@ingenieurbuerofilgis.de
+49 160 751 403 1
Kontakt
simon@ingenieurbuerofilgis.de
+49 160 751 403 1
Betreuer:
[identification] Implementation of identification with algebraicgeometry (Goppa) codes
goppa algebraic geometry codes identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing identification with Goppa codes, aiming at the fastest implementation, and testing their performance in comparison to other current implementations. The reference articles for this implementation are:
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
[identification] Implementation of identification with universal hash functions
universal hash identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
[identification] Applications of Identification Codes in V2X Communications
sumo, ns3, ns3, vehicular, communication, identification, c++, ReedMuller
Beschreibung
As part of the NewCom Project, new communication paradigms are investigated from an experimental perspective in order to construct proofofconcept implementations that demonstrate the theoretical results obtained for PostShannon Communication schemes. In particular, this MSc thesis focuses on Identification Codes and their integration into a simulation environment where vehicular networks are modelled.
For this, the master student will first conduct a review of the stateoftheart use cases for identification in the scientific literature and in form of patents, with an emphasis on V2X communications. By using an opensource V2X implementation based on LDR’s Simulation of Urban Mobility (SUMO) framework integrated with ns3’s implementation of the ITSG5 and LTE standards and conducting simulation in specific scenarios, the student will gain a first impression of the performance of the system using traditional transmission schemes. The integration of existing implementation of identification codes culminates this thesis, where KPIs will be defined in order to compare the advantages of using identification instead of transmission in the context of V2X communications.
Details about the C++ tools/libraries
The software used for the simulation of the vehicular network communication is ezCar2x
which build on and integrates the NS3 (network simulation) and SUMO (traffic simulation) libraries
For the identification part and identification code based on ReedMuller codes needs to be reimplemented (work in progress) from Python into C++ using the Givaro library
Voraussetzungen

Knowledge of communications engineering, mobile communications, wireless channel models, signal processing, and channel coding techniques (experience in LTE/5G cellular networks is a plus)

Interest in novel communication concepts as well in their practical implementation

Software experience: MATLAB, C++ and Python (experience with ns3 or SUMO is a plus)

Comfortable working with Linux operative systems and distributed version control tools (e.g., gitlab)

Goaloriented and structured work style
Kontakt
To apply, Please send your application by email to Roberto Ferrara (roberto.ferrara@tum.de) and Luis TorresFigueroa (luis.torres.figueroa@tum.de) with the following documents:

Curriculum vitae

Academic transcript

Short motivation (0.5 – 1 page)
Betreuer:
[security] Practical implementation of physicallayer semantic security
semantic, security, secrecy, programming, implementation
Beschreibung
The goal of this project is to implement in Python/Sagemath the security functions (at least one of four) described in https://arxiv.org/abs/2102.00983
Sagemath contains libraries for mosaics, BIBDs, etc, that can be used for the project.
Motivation:
There are various types of security definitions.
The mutual information based types, in increasing order of security requirement are
 Weak secresy asks that the average mutual information of the eavesdropper I(M:E)/n goes to 0 for a uniform message M (average here means averaged over the blocklength n, an additional average over M is implicit in the mutual information)
 Strong secrecy asks that the total mutual information I(M:E) goes to 0,
 Semantic security asks that the total mutual informaiton I(M:E) goes to 0 for any distribution of the message M (and thus in particular for all distributions that pick any of two chosen messages with 1/2 probabilty)
Then there are the almostequivalent respective indistiguishablity types of security requirements (below PQ_1 is the statistical distance and Exp_M is expectation value over M)
 average indistinguishability 1/n Exp_M  P_{EM}  P_E _1 for a uniform message M goes to 0 (again average refers over the blocklegth n, clearly there is also the average over M)
 total indistiguishability Exp_M  P_{EM}  P_E _1 for a uniform message M goes to 0
 indistinguishability P_{Em}  P_{Em'}_1 for any two messages m and m' goes to 0.
Each of the indistiguishabilities can also be written using KL digvergence instead of statistical distance, in which case the conditions are exactly equivalent to their mutual information versions.
Strong secrecy is the standard security requirement considered in informationtheoretic security, while semantic security is the minimum requirement considered in computational security.
Informationtheoretic (physicallayer) security differs from computational security in that the secrecy is guaranteed irrespective of the power of the adversary, while in computational security E is computationally bounded. Computational security also assumes that the message is at least of a certain length for the schemes to work, and thus if the message to be secured is too small it needs to be padded to a larger message.
In practice, information theoretic security is expensive, because the messages that can be secured can be only as long as the keys that can be generated. However, in identification only a very small part of the message needs to be secured, which in computational security triggers padding and thus waste, but on the other side makes informationtheoretic security accessible and not so expensive.
At the same time, the security of identification implicitly requires semantic security. It has been known for a while that hash functions provide informationtheoretic strong secrecy. However, because the standard for informationtheoretic security has been strong secrecy, before https://arxiv.org/abs/2102.00983 no efficient functions where known to provide informationtheoretic semantic security.
We need an implementation of these type of functions so that we can integrate informationtheoretic security into our identification project.
Betreuer:
[quantum] Realignment criterion and upper bounds in deviceindependent QKD
Beschreibung
This paper uses the partial transpose as a tool to derive upper bounds on deviceindependent QKD
https://arxiv.org/abs/2005.13511
In this project the goal is to try to generalize the above to the other tools like the reallignment criterion:
https://arxiv.org/abs/quantph/0205017
https://arxiv.org/abs/0802.2019
Voraussetzungen
basics of quantum information/quantum formalism
Betreuer:
[quantum] Semantic security of infinitedimensional classicalquantum channels
Beschreibung
Generalize semantic security of classicalquantum channels to infinite dimensional channel (not necessarily gaussian)
 [1] finite dimensional classicalquantum case
https://arxiv.org/abs/2001.05719  finite and infinite dimensional classical case
https://arxiv.org/abs/1811.07798  [this subpoint can be a project by itself] the finite dimesional case needs to be recast into smoothmax information (instead than Lemma 5.7 of [1]) as the classical case does, this paper proves properties of the smoothmaxinf in finite dimension that we would need for that
https://arxiv.org/abs/2001.05719  papers regarding the capacity for infinite dimensional channels
http://arxiv.org/abs/quantph/9912067v1
http://arxiv.org/abs/quantph/0408009v3
http://arxiv.org/abs/quantph/0408176v1
Voraussetzungen
quantum information theory
Betreuer:
[quantum] Asymptotic continuity of restricted quantum relative entropies under general channels
quantum, relative entropy, Pinsker, reverse, inequality, information thoery, asymptotic, continuity
Beschreibung
Asypmtotic continuity is a property in the form of inequalities (classically known also as inequalities of the reversePinker type) that is necessary to prove upper bounds on operational capacities.
The (quantum) relative entropy (also known as quantum divergence and classically also known as KullbacktLeibler divergence), can be used to define various entanglment measures many of which have a proven asymptotic continuity.
Of particular interest are the restricted quantum relative entropies defined by Marco Piani (https://arxiv.org/abs/0904.2705), many of which satisfy asymptotic continuity (A.S.)
 https://arxiv.org/abs/quantph/9910002
 https://arxiv.org/abs/quantph/0203107
 https://arxiv.org/abs/quantph/0507126
 https://arxiv.org/abs/1210.3181
 https://arxiv.org/abs/1507.07775
 https://arxiv.org/abs/1512.09047
In the above there are maybe 23 different proof styles.
We can group the results in the above as follows:
 A.S. for entropy, conditional entropies, mutual information, conditional mutual information
 A.S. for relative entropies with infimum over states on the second argument
 A.S. relative entropies with infimum over state *and maximization over measurement channels*
The goal of the project is to generalize the last case to asymptotic continuity for relative entropies with infimum over state and maximization over *general* channels.
 Partial results toward this goal can be found in the appendix of my PhD thesis: http://web.math.ku.dk/noter/filer/phd18rf.pdf
 Such a result would have immediate applications to this paper: https://arxiv.org/abs/1801.02861
Possible new proof directions are
 using Renyi αrealtive entropies with the limit α>1
 using Kim's operator inequality from
https://arxiv.org/abs/1210.5190
to get an operator inequality looking like a reverse strong subadditivity (see https://www.youtube.com/watch?v=P3xI1u1Y2s for a good overview and in particular at minute 31:20 for the reverse SSA)
Voraussetzungen
Knowledge of quantum information is highly recommended/required.
Knowledge of matrix analysis will be a strong advantage.
Kontakt
roberto.ferrara@tum.de
Betreuer:
[quantum] Practical protocols for quantum synchronization in classical network
quantum, network, synchronization
Beschreibung
relevant papers
https://arxiv.org/abs/1310.6043
https://arxiv.org/abs/1304.5944
https://arxiv.org/abs/1310.6045
https://arxiv.org/abs/1703.05876
https://arxiv.org/abs/1303.6357
background papers
https://ieeexplore.ieee.org/document/7509657
Voraussetzungen
Knowledge of quantum theory as provided by the course Algorithms in Quantum Theory or similar
Betreuer:
[quantum] Entanglementmeasures upper bounds on deviceindependent distillable key
quantum, qkd, entanglement
Beschreibung
The goal of this work is to try to upper bound the deviceindependent distillable key in terms of locally restricted relative entropy of entanglement (an entanglement measure).
The following are relevant works/articles
 works toward even *a definition* of device independent distillable key
https://arxiv.org/abs/2005.13511
https://arxiv.org/abs/2005.12325
https://arxiv.org/abs/1810.05627  works relating distillable entanglement and distillable key to locally restricted relative entropy measures
https://arxiv.org/abs/1609.04696
https://arxiv.org/abs/1402.5927  the first definition of restricted relative entropies
https://arxiv.org/abs/0904.2705  important properties of restricted relative entropies, and some overview of entanglement measures
https://arxiv.org/abs/1210.3181  my PhD thesis
http://web.math.ku.dk/noter/filer/phd18rf.pdf
Voraussetzungen
Strong background in quantum theory is required, preferably in quantum information theory, which is not covered by the course Algorithms in Quantum Theory
Betreuer:
Explicit Construction of Deterministic Identification Codes
Identification via channels, identification codes,
Beschreibung
In this thesis, the student after studying deterministic identification will construct the explicit codes for certain channels.
Voraussetzungen
Interested student are encouraged to contact me and send me a CV as well as all the academic transcripts and relevant courses that they have attended.
As well familiarity with the following is required:
Background in Information Theory and Channel Coding
Familiarity in fundamentals of Identification Theory
Betreuer:
Error Correction in DNA Storage
DNA storage, Error Correction, Deletion, Insertion, Substitutions
Beschreibung
DNA storage is an uprising topic in the research field of storage systems. Due its natural longetivity, robustness, and density properties the main application would arise in highdense longterm storage systems. The interest has become larger and larger due the large amount of data nowadays and the relative new biological advances in DNA synthesis and sequencing processes (e.g. polymerase chain reaction). In contrary to conventional storing methods, due to the nature of DNA and the involved biological processes special error patterns such as insertion, deletion, and substitution errors occur. To tackle these errors novel methods for correction have to be investigated. Moreover, the model of the DNA storage channel needs to be investigated thorougly, e.g. capacity statements.
Voraussetzungen
 Linear Algebra
 Channel Coding
 Coding Theory for Storage and Networks (optional)
Betreuer:
Error Correction for DNABased Data Storage
Beschreibung
DNAbased data storage is a novel approach for long term digital data archiving.
Due to the unique nature of writing and reading DNA, the channel associated with these processes is still realtively poor understood and varies over different synthesis (writing) and sequencing (reading) technologies. The task of the student is to analyze different sequencing methods and the associated errors and formulate associated channel models. Based on these models, errorcorrecting schemes shall be evaluated.
Voraussetzungen
 Basic principles of stochastic and algebra
 Channel Coding
 Information Theory
Betreuer:
Forschungspraxis (Research Internships)
Multiarmed Bandits  Basic algorithms and possible applications
Probability  Information theory  Statistics  Algorithms  Applications
Beschreibung
Multiarmed bandits is a simple but very powerful framework for algorithms that make decisions over time under uncertainty.
In the basic version, an algorithm has K possible actions to choose from, a.k.a. arms, and T rounds. In each round, the algorithm chooses an arm
and collects a reward for this arm. The reward is drawn independently from some distribution which is fixed (i.e., depends only on the chosen arm), but not known to the algorithm.
we have a tradeoff between exploration and exploitation: making optimal nearterm decisions based on the available information. This tradeoff, which arises in numerous application scenarios, is essential in multiarmed bandits. Essentially, the algorithm strives to learn which arms are best (perhaps approximately so), while not spending too much time exploring.
The plan is to study the basic algorithms and implement them using relevant reallife data.
References: The following two books are comprehensive surveys of the field. Fortunately, both are freely available online:
(1) Alexander Slivkins, Introduction to Multiarmed Bandits, 2019.
https://arxiv.org/abs/1904.07272
(2) T. lattimore and C.Szepesvari, Bandit Algorithms (Cambridge University Press, 2020)
https://torlattimore.com/downloads/book/book.pdf
Voraussetzungen
Interest and some background in Probability, Information theory and Algorithm design.
References
Betreuer:
MABBased Efficient Distributed ML on the Cloud
Distributed Machine Learning (ML), MultiArmed Bandits (MABs), Cloud Simulations (AWS, GCP, ...)
Beschreibung
We consider the problem of running a distributed machine learning algorithm on the cloud. This imposes several challenges. In particular, cloud instances may have different performances/speeds. To fully leverage the performance of the instances, we want to characterize their speed and potentially use the fastest ones. To explore the speed of the instances while exploiting them (assigning computational tasks), we use the theory of multiarmed bandits (MABs).
The goal of the research intership is to start by implementing existing theoretical algorithms [1] and possibly adapting them based on the experimental observations.
[1] M. Egger, R. Bitar, A. WachterZeh and D. Gündüz, Efficient Distributed Machine Learning via Combinatorial MultiArmed Bandits, submitted to IEEE Journal on Selected Areas in Communications (JSAC), 2022.
Voraussetzungen
 Information Theory
 Machine Learning Basics
 Python (Intermediate Level)
Betreuer:
Private and Secure Federated Learning
Beschreibung
In federated learning, a machine learning model shall be trained on private user data with the help of a central server, the socalled federator. This setting differs from other machine learning settings in that the user data shall not be shared with the federator for privacy reasons and/or to decrease the communication load of the system.
Even though only intermediate results are shared, extra care is necessary to guarantee data privacy. An additional challenge arises if the system includes malicious users that breach protocol and send corrupt computation results.
The goal of this work is to design, implement and analyze coding and informationtheoretic solutions for privacy and security in federated learning.
Voraussetzungen
 Coding Theory (e.g., Channel Coding)
 Information Theory
 Machine Learning Basics
Betreuer:
[identification] PseudoRandom Identification
random pseudo identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
One advantage can be gained by using pseudo randomness to generate both the input and the code itself.
Your task will be implementing the identification codes described in the attached pdf (an english translation of a paper published in russian in a russian journal) aiming at the fastest implementation and smallest collisions, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI from TUM and CeTI from TU Dresden, the latter having already some preliminary implementation of pseudorandom identification using various pseudorandom generators. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
Dimension of sLifted ReedSolomon Codes
Beschreibung
In the work [1], we developed a method to analyze the dimension of quadraticcurvelifted ReedSolomon codes and its asymptotic behavior. The method gives tighter bound on the dimension compared to the estimation given in [2], which defines a more general class of lifted ReedSolomon codes with regard to curves of higher degree.
In this work, the student is expected to extended the method in [1] to the general class of codes in [2] to analyse the dimension and its asymptotic behavior.
Betreuer:
[quantum] Quantum Machine Learning for Communication
physical, layer, quantum, machine learning, nonlinear
Beschreibung
As part of an ongoing project with Huawei we are looking into quantum machine learning algorithms applied to decoding at the end of an optical fiber in the nonlinear regime.
So far we have tried only the quantum version of kmean clustering, however the goal is to test further quantum algorithms, in particular quantum support vector machines next, and their classical quantuminspired counterpart.
The projects will involve reading the literature on quantum machine learning algorithms and quantuminspired algorithms, find or come up with an implementation (this will involve the use of quantum libraries, in particular so far we have use qiskit), and benchmark the performance.
Voraussetzungen
Knowledge of quantum mechanics or quantum information is highly recommended.
Betreuer:
Successive Cancellation Inactivation Decoding over qary Erasure Channels
Beschreibung
The student is expected to understand a recent decoding algorithm called successive cancellation inactivation (SCI) decoding [1] and extend it towards qary erasure channels.
[1] https://ieeexplore.ieee.org/abstract/document/9174226
Voraussetzungen
The student is expected to have a good understanding of linear algebra and be able to implement via Matlab or Julia. The following courses are beneficial:
 Information Theory
 Channel Coding
 Channel Codes for Iterative Decoding
Kontakt
mustafa.coskun@tum.de
Betreuer:
Information freshness in nextgeneration IoT networks
Beschreibung
Kontakt
andrea.munari@dlr.de
Betreuer:
[identification] Implementation of identification with algebraicgeometry (Goppa) codes
goppa algebraic geometry codes identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing identification with Goppa codes, aiming at the fastest implementation, and testing their performance in comparison to other current implementations. The reference articles for this implementation are:
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
[identification] Implementation of identification with universal hash functions
universal hash identification
Beschreibung
Identification is a communication scheme that allows rate doubly exponential in the blocklemght, with the tradeoff that identities cannot be decoded (as messages do) but can only be verified.
The double exponential growth presents various challenges in the finite regime: there are heavy computational costs introduced at the encoder and decoder and heavy tradeoffs between the error and the codes sizes.
The ultimate goal is to find a fast, reliable implementation while still achieving large code sizes.
Identification codes can be achieved by first removing the errors from the channel with regular transmission channel coding, and then sending a challenge though the corrected channel. For every identity i, The channenge is generated by picking a random input m and computing the corresponding output T_i(m) using a function T_i that depends on the identity. The challenge is then the pair m,T_i(m) and the receiver wanting to verify an identity j will verify whether j=i by testing the challenge. This is done by recomputing the output with T_j and verifying whether T_j(m)= T_i(m). The errors are reduced by ensuring that the various functions collide on a small fraction of the possible inputs.
It turns out that choosing good sets of funtions {T_i} is the same as choosing errorcorrection codes {c_i} with large distance, where now each codeword c_i defines a function by mapping positions m (sometimes called code locators) to symbols c_im of the codeword.
We can thus construct identification codes by choosing errorcorrection codes where we are only interested in the performance of the error correction encoders (we are not interested in the errorcorrection decoder or errorcorrection codes).
Your task will be implementing the identification codes described in
aiming at the fastest implementation, and testing their performance in comparison to other current implementations.
For reference, our previous work on identification based on ReedSolomon and ReedMuller code can be found at
The coding will be in Python/Sagemath.
The working language will be in English.
Environment: we collaborate with LTI. At LNT and LTI there is currently a lot of funding for research in identification. Therefore you will find a large group of people that might be available for discussion and collaboration.
Betreuer:
[quantum] Realignment criterion and upper bounds in deviceindependent QKD
Beschreibung
This paper uses the partial transpose as a tool to derive upper bounds on deviceindependent QKD
https://arxiv.org/abs/2005.13511
In this project the goal is to try to generalize the above to the other tools like the reallignment criterion:
https://arxiv.org/abs/quantph/0205017
https://arxiv.org/abs/0802.2019
Voraussetzungen
basics of quantum information/quantum formalism
Betreuer:
Identification Codes via Prime Numbers
Identification via channels, Prime Number Encryption
An approach for construction of identification codes for noiseless channel by means of the prime number encryption would be studied.
Beschreibung
In original scheme of identificaion via channels (Ahlswede and Dueck, 1989), a nonconstructive method for coding for noiseless channel was studied. To address the explicit construction of identificaion codes, foremost Ahlswede and Verboven, 1991 provide a number theoretic approach based on the two successive prime number encryption. This method require the knowledge of first 2^n prime numbers for a blocklength of n codeword. In this research internship, this method along with related prime number encryption tools and theorems would be investigated. Further, the extension of this scheme to a general DMC will be analyzed.
Voraussetzungen
Interested student are encouraged to contact me and send me a CV as well as all the academic transcripts and relevant courses that they have attended.
As well familiarity with the Basics of following is required:
 information/identification theory
 channel coding
 prime number theorem (Chebyshev)
Betreuer:
On the Equivalence of Identification and Authentication
Identification via channel, identification codes, authentication, authentication codes
A Certain equivalence of identification and authentication would be shown.
Beschreibung
It would be shown that under suitable formulations (preserving all salient features) the two problem of Identification (Ahlswede and Dueck, 1989) and Authentication (Simmons, G. J. 1984) are in essence very close to each other. This equivalency was conjectured first by M. S. Pinsker. In this research internship the student is expected to address this conjecture. Both problems must be studied separately and then the similar essence of them should be drawn out. In particular the identification codes and authentication codes along with theire relation will be investigated.
Voraussetzungen
 Background in Information Theory and Channel Coding
 Familiarity with fundamentals of Identification Theory
References:
 Simmons, G. J. 1984, “Message authentication: a game on hypergraphs,” Congressus Numer. 45:161192.
 Simmons, G. J. 1982, “A game theory model of digital message authentication,” Congressus Numer., 34, 413424
 Simmons, G. J. 1985, “Authentication theory/coding theory,” in: Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, vol. 196, SpringerVerlag, Berlin, pp. 411432.
 E. Gilbert, F. J. MacWilliams and N.J. A. Sloane, 1974, “Codes which detect deception,” Bell System Tech. J., 53, 405424.
 R. Ahlswede and G. Dueck, “Identification via channels,” in IEEE Trans. on Inf. Theory, vol. 35, no. 1, pp. 1529, Jan. 1989, doi: 10.1109/18.42172.
 L. A. Bassalygo, M. V. Burnashev, “Authentication, Identification, and Pairwise Separated Measures”, Problems Inform. Transmission, 32:1 (1996), 33–39
Betreuer:
Error Correction in DNA Storage
DNA storage, Error Correction, Deletion, Insertion, Substitutions
Beschreibung
DNA storage is an uprising topic in the research field of storage systems. Due its natural longetivity, robustness, and density properties the main application would arise in highdense longterm storage systems. The interest has become larger and larger due the large amount of data nowadays and the relative new biological advances in DNA synthesis and sequencing processes (e.g. polymerase chain reaction). In contrary to conventional storing methods, due to the nature of DNA and the involved biological processes special error patterns such as insertion, deletion, and substitution errors occur. To tackle these errors novel methods for correction have to be investigated. Moreover, the model of the DNA storage channel needs to be investigated thorougly, e.g. capacity statements.
Voraussetzungen
 Linear Algebra
 Channel Coding
 Coding Theory for Storage and Networks (optional)
Betreuer:
Error Correction for DNABased Data Storage
Beschreibung
DNAbased data storage is a novel approach for long term digital data archiving.
Due to the unique nature of writing and reading DNA, the channel associated with these processes is still realtively poor understood and varies over different synthesis (writing) and sequencing (reading) technologies. The task of the student is to analyze different sequencing methods and the associated errors and formulate associated channel models. Based on these models, errorcorrecting schemes shall be evaluated.
Voraussetzungen
 Basic principles of stochastic and algebra
 Channel Coding
 Information Theory