Lists that are Smaller than their Parts: A New Approach to Secrecy

Exclusively Licensed

Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.

Researchers

Muriel Medard / Mark Christiansen / Ken Duffy / Flavio Calmon / Linda Zeger

Departments: Dept of Electrical Engineering & Computer Science
Technology Areas: Computer Science: Cybersecurity, Networking & Signals
Impact Areas: Connected World

  • method and apparatus for secure communication
    United States of America | Granted | 10,311,243

License this technology

Interested in this technology? Connect with our experienced licensing team to initiate the process.

Sign up for technology updates

Sign up now to receive the latest updates on cutting-edge technologies and innovations.