photo
Vinod M. Prabhakaran

School of Technology and Computer Science
Tata Institute of Fundamental Research
Homi Bhabha Road
Mumbai, India 400005
Phone: +91 22 2278 2081
Email: ...@tifr.res.in (fill in the dots with vinodmp)

Publications

  1. ``Private Index Coding,'' V. Narayanan, J. Ravi, V. Mishra, B. Dey, N. Karamchandani, V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 68, no. 3, pp. 2020-2049, March 2022. (IEEEXplore)
  2. ``Optimal Communication Rates and Combinatorial Properties for Common Randomness Generation,''
    Y. Han, K. Tatwawadi, G. Kurri, Z. Zhou, V. Prabhakaran, T. Weissman,
    IEEE Transactions on Information Theory, vol. 67, no. 12, pp. 7723-7739, December 2021. (IEEEXplore)
  3. ``On the Capacity Enlargement of Gaussian Broadcast Channels with Passive Noisy Feedback,''
    A. Ravi, S. Pillai, V. Prabhakaran, M. Wigger, IEEE Transactions on Information Theory,
    vol. 67, no. 10, pp. 6356-6367, October 2021. (IEEEXplore)
  4. ``Coordination Through Shared Randomness,'' G. Kurri, V. Prabhakaran, and A. Sarwate,
    IEEE Transactions on Information Theory, vol. 67, no. 8, pp. 4948-4974, August 2021. (IEEEXplore | arXiv)
  5. ``Interactive Secure Function Computation,'' D. Data, G. Kurri, J. Ravi, and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5492-5521, September 2020. (IEEEXplore | arXiv)
  6. ``Joint State Estimation and Communication Over a State-Dependent Gaussian Multiple Access Channel,''
    V. Ramachandran, S. Pillai, and V. Prabhakaran, IEEE Transactions on Communications, vol. 67, no. 10, pp. 6743-6752, October 2019. (IEEEXplore)
  7. ``Plausible Deniability over Broadcast Channels,'' M. Bakshi and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 64, no. 12, pp. 7883-7902, December 2018. (IEEEXplore | arXiv)
  8. ``Private Coded Caching,'' V. Ravindrakumar, P. Panda, N. Karamchandani, and V. Prabhakaran,
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 685-694, March 2018. (IEEEXplore | arXiv)
  9. ``Communication in the Presence of a State-Aware Adversary,'' A. Budkuley, B. Dey, and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 63, no. 11, pp. 7396-7419, November 2017. (IEEEXplore | arXiv)
  10. ``Wiretapped Oblivious Transfer,'' M. Mishra, B. Dey, V. Prabhakaran and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2560-2595, April 2017. (IEEEXplore | arXiv)
  11. ``Capacity Results for Multicasting Nested Message Sets over Combination Networks,''
    S. Bidokhti, V. Prabhakaran, and S. Diggavi, IEEE Transactions on Information Theory, vol. 62, no. 9, pp. 4968-4992, September 2016. (IEEEXplore | arXiv)
  12. ``Communication and Randomness Lower Bounds for Secure Computation,'' D. Data, V. Prabhakaran, and M. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 62, no. 7, pp. 3901--3929, July 2016. (IEEEXplore | arXiv | conference version from CRYPTO 2014).
  13. ``An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback,''
    L. Czap, V. Prabhakaran, C. Fragouli, and S. Diggavi, IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2430 - 2480, May 2016. (IEEEXplore)
  14. ``Wireless Network Security: Building on Erasures,'' C. Fragouli, V. Prabhakaran, L. Czap, and S. Diggavi,
    Proceedings of the IEEE, vol. 103, no. 10, pp. 1826 - 1840, October 2015. (IEEEXplore)
  15. ``Secret Communication over Broadcast Erasure Channels with State-feedback,''
    L. Czap, V. Prabhakaran, C. Fragouli, and S. Diggavi, IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4788 - 4808, September 2015. (IEEEXplore)
  16. ``Secure Network Coding With Erasures and Feedback,'' L. Czap, C. Fragouli, V. Prabhakaran, and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 61, no. 4, pp. 1667-1686, April 2015. (IEEEXplore)
  17. ``Assisted Common Information with an Application to Secure Two-Party Sampling,'' V. Prabhakaran and M. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 60, no. 6, pp. 3413-3434, June 2014. (IEEEXplore | arXiv)
  18. ``Is Non-Unique Decoding Necessary?,'' S.S. Bidokhti and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2594-2610, May 2014. (IEEEXplore | arXiv)
  19. ``Interference Channels With Half-Duplex Source Cooperation ,''
    R. Wu, V. Prabhakaran, P. Viswanath, and Y. Wang, IEEE Transactions on Information Theory, vol. 60, no. 3, pp. 1753-1781, March 2014. (IEEEXplore | arXiv)
  20. ``Secrecy via Sources and Channels,'' V. Prabhakaran, K. Eswaran, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 58, no. 11, pp. 6747-6765, November 2012. (IEEEXplore | arXiv)
  21. ``Hybrid Digital-Analog Codes for Source-Channel Broadcast of Gaussian Sources over Gaussian Channels,'' V. Prabhakaran, R. Puri, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 57, no. 7, pp. 4573-4588, July, 2011. (IEEEXplore | arXiv)
  22. ``Interference Channel with Source Cooperation,'' V. Prabhakaran and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 156-186, January 2011. (IEEEXplore | arXiv)
  23. ``Interference Channel with Destination Cooperation,'' V. Prabhakaran and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 187-209, January 2011.
    (IEEEXplore | arXiv)
  24. ``The Two User Gaussian Compound Interference Channels,'' A. Raja, V. Prabhakaran, and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 55, no. 11, pp. 5100-5120, November 2009. (IEEEXplore | arXiv)
  25. ``Colored Gaussian source-channel broadcast for heterogeneous (analog/digital) receivers,'' V. Prabhakaran, R. Puri, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 54, no. 4, pp. 1807-1814, April, 2008. (IEEEXplore)
  26. ``Decentralized Erasure Codes for Distributed Networked Storage,'' A. Dimakis, V. Prabhakaran, and K. Ramchandran,
    Special Issue of IEEE Transactions on Information Theory: Networking and Information Theory, July, 2006. (IEEEXplore | arXiv)
    The conference version received the best paper award at the IEEE/ACM Symposium on Information Processing in Sensor Networks (IPSN), 2005.
  27. ``On Compressing Encrypted Data,'' M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, and K. Ramchandran,
    IEEE Transactions on Signal Processing: Networking and Information Theory, October, 2004. (IEEEXplore)
  1. ``Secure Non-Interactive Reduction and Spectral Analysis of Correlations,''
    P. Agarwal, V. Narayanan, S. Pathak, M. Prabhakaran, V. Prabhakaran, M. Rehan, EUROCRYPT 2022.
  2. ``Rényi Divergence Based Bounds on Generalization Error,'' E. Modak, H. Asnani, and V. Prabhakaran,
    IEEE Information Theory Workshop (ITW), 2021. (IEEEXplore)
  3. ``Secure Computation from One-Way Noisy Communication, or: Anti-Correlation via Anti-Concentration,''
    S. Agrawal, Y. Ishai, E. Kushilevitz, V. Narayanan, M. Prabhakaran, V. Prabhakaran, and A. Rosen, CRYPTO 2021. (Springer)
  4. ``Communication With Adversary Identification in Byzantine Multiple Access Channels,'' N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    IEEE International Symposium on Information Theory (ISIT), 2021. (Extended version at arXiv)
  5. ``Multiple Access Channel Simulation,'' G. Kurri, V. Ramachandran, S. Pillai, and V. Prabhakaran,
    ISIT, 2021. (Extended version at arXiv)
  6. ``Compound Arbitrarily Varying Channels,'' S. Chaudhuri, N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    ISIT, 2021. (Extended version at arXiv)
  7. "On the Capacity Region of Gaussian Broadcast Channels under Two-Sided Noisy Feedback,"
    A. Ravi, S. Pillai, V. Prabhakaran, and M. Wigger, ISIT, 2021.
  8. ``Zero-Communication Reductions,'' V. Narayanan, M. Prabhakaran, and V. Prabhakaran,
    Theory of Cryptography Conference (TCC), 2020. (full version at ePrint archive | Springer)
  9. ``Cryptography from One-Way Communication: On Completeness of Finite Channels,''
    S. Agrawal, Y. Ishai, E. Kushilevitz, V. Narayanan, M. Prabhakaran, V. Prabhakaran, and A. Rosen, ASIACRYPT 2020. (Springer)
  10. ``Private Two-Terminal Hypothesis Testing,'' V. Narayanan, M. Mishra and V. Prabhakaran,
    ISIT, 2020. (IEEEXplore)
  11. ``Secure Computation to Hide Functions of Inputs,'' G. Kurri and V. Prabhakaran,
    ISIT, 2020. (IEEEXplore)
  12. ``Strong Coordination with Side Information,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    ISIT, 2020. (IEEEXplore)
  13. ``Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation,''
    S. Pillai, M. Prabhakaran, V. Prabhakaran, and S. Sridhar, INDOCRYPT 2019. (Springer)
  14. ``Multiple Access Channels with Byzantine Users,'' N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    ITW, 2019. (IEEEXplore | Extended version at arXiv)
  15. ``Multiple Access Channels with Adversarial Users,'' N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    ISIT, 2019. (IEEEXplore | Extended version at arXiv)
  16. ``Message and State Communication over Channels with Action Dependent States,''
    V. Ramachandran, S. Pillai, and V. Prabhakaran, ISIT, 2019. (IEEEXplore)
  17. ``Channels with Action Dependent States and Common Reconstructions,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    National Conference on Communications (NCC), 2019. Best paper award. (IEEEXplore)
  18. ``Oblivious Transfer in Incomplete Networks,'' V. Narayanan and V. Prabhakaran,
    Theory of Cryptography Conference (TCC), 2018. (full version at ePrint archive | Springer)
  19. ``On the Rate Distortion Function of Arbitrarily Varying Remote Sources,''
    A. Budkuley, B. Dey, S. Jaggi, and V. Prabhakaran, ITW, 2018. (IEEEXplore)
  20. ``State-Dependent Gaussian Broadcast Channel with Common State Reconstructions,'' V. Ramachandran, M. Sreenivasan, S. Pillai, and V. Prabhakaran,
    International Symposium on Information Theory and Its Applications (ISITA), 2018. (IEEEXplore)
  21. ``Secure Computation of Randomized Functions: Further Results,'' D. Data and V. Prabhakaran,
    ITW, 2017. (arXiv)
  22. ``Coding for Arbitrarily Varying Remote Sources,'' A Budkuley, B. Dey, and V. Prabhakaran,
    ISIT, 2017. (arXiv)
  23. ``Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound,''
    M. Prabhakaran and V. Prabhakaran, 43rd International Colloquium of Automata, Languages and Programming (ICALP), 2016. (DROPS | arXiv)
  24. ``Lower Bounds and Optimal Protocols for Three-Party Secure Computation,''
    S. Rajan, S. Rajakrishnan, A. Thangaraj, and V. Prabhakaran, ISIT, 2016. (IEEEXplore)
  25. ``Lower Bounds for Interactive Function Computation via Wyner Common Information,''
    S. Rajakrishnan, S. Rajan, and V. Prabhakaran,
    National Conference on Communications (NCC), 2016. (arXiv)
  26. ``Coded Caching in Hybrid Networks,'' A. Sridhar, N. Karamchandani, and V. Prabhakaran,
    NCC, 2016.
  27. ``Private Data Transfer over a Broadcast Channel,'' M. Mishra, T. Sharma, B. Dey, and V. Prabhakaran,
    ISIT, 2015. (arXiv)
  28. ``On the Noisy Feedback Capacity of Gaussian Broadcast Channels,'' S. Pillai and V. Prabhakaran.
    ITW, Jerusalem, 2015. (arXiv)
  29. ``Critical Database Size for Effective Caching,'' Ajaykrishnan N., N. Prem, V. Prabhakaran, R. Vaze,
    NCC, 2015. (arXiv)
  30. ``A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels,''
    S. Rao and V. Prabhakaran,
    ITW, 2014. (arXiv)
  31. ``How to Securely Compute the Modulo-Two Sum of Binary Sources,'' D. Data, B. Dey, M. Mishra, V. Prabhakaran,
    ITW, 2014. (arXiv)
  32. ``Correlated Jamming in a Joint Source Channel Communication System,''
    A Budkuley, B. Dey, and V. Prabhakaran, ISIT, 2014. (arXiv)
  33. ``Assisted Sampling of Correlated Sources,'' V. Prabhakaran and A. Sarwate,
    ISIT, 2013.
  34. ``Using Feedback for Secrecy over Graphs,'' S. Mishra, C. Fragouli, V. Prabhakaran, and S. Diggavi,
    ISIT, 2013.
  35. ``Estimation of Bandlimited Signals from the Signs of Noisy Samples,'' A. Kumar and V. Prabhakaran,
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013. (extended arXiv draft)
  36. ``On Secure Multiparty Sampling For More than Two Parties,'' M. Prabhakaran and V. Prabhakaran,
    ITW, 2012.
  37. ``On Multicasting Nested Message Sets Over Combination Networks,'' S. Saeedi, V. Prabhakaran, and S. Diggavi,
    ITW, 2012.
  38. ``Untrusting Network Coding,'' Y. Büyükalp, G. Maatouk, V. Prabhakaran, and C. Fragouli,
    NETCOD, 2012. (IEEEXplore)
  39. ``Secure Distributive Storage of Decentralized Data: Can Interaction Help?,''
    S. El Rouayheb, V. Prabhakaran, and K. Ramchandran, ISIT, 2010. (IEEEXplore)
  40. ``On Degraded Two Message Set Broadcasting,'' S. S. Bidokthi, S. Diggavi, C. Fragouli, and V. Prabhakaran,
    ITW , October 2009. (IEEEXplore)
  41. ``Communication by Sleeping: Optimizing a Relay Channel Under Wake and Transmit Power Costs,''
    V. Prabhakaran and P.R. Kumar, ISIT, 2009. (IEEEXplore)
  42. ``Opportunistic Interference Management,'' N. Khude, V. Prabhakaran, and P. Viswanath,
    ISIT, July 2009. (IEEEXplore)
  43. ``Reversibility in Linear Deterministic Networks under Linear Coding,'' A. Raja, V. Prabhakaran and P. Viswanath,
    ITW, June, 2009. (arXiv)
  44. ``Harnessing Bursty Interference,'' N. Khude, V. Prabhakaran, and P. Viswanath,
    ITW, June 2009. (IEEEXplore)
  45. ``The Secrecy Capacity of a Class of Non-degraded Parallel Gaussian Compound Wiretap Channels,'' T. Liu, V. Prabhakaran, and S. Vishwanath,
    ISIT, 2008. (IEEEXplore).
  46. ``Broadcasting with Degraded Message Sets: A Deterministic Approach,'' V. Prabhakaran, S. Diggavi, and D. Tse,
    Allerton Conference, 2007. (Paper)
  47. ``A Separation Result for Secure Communication,'' V. Prabhakaran and K. Ramchandran,
    Allerton Conference, 2007. (Paper)
  48. ``On Secure Distributed Source Coding,'' V. Prabhakaran and K. Ramchandran,
    ITW, Lake Tahoe, 2007. (IEEEXplore)
  49. `` Channel Coding with Strictly Causal Colored Side-Information at Transmitter,''
    V. Prabhakaran, D. Tse, and K. Ramchandran
    , ISIT, 2007. (IEEEXplore)
  50. ``On the Role of Helpers in Peer-to-Peer File Download Systems: Design, Analysis and Simulation,''
    J. Wang, C. Yeo, V. Prabhakaran, and K. Ramchandran, International Workshop on Peer-to-Peer Systems (IPTPS), 2007. (Microsoft Research)
  51. ``Syndrome-based Robust Video Transmission over Networks with Bursty Losses,''
    J. Wang, V. Prabhakaran, and K. Ramchandran,
    IEEE International Conference on Image Processing (ICIP), 2006. (IEEEXplore)
  52. ``On Source Coding with Side-Information Under Ambiguous State of Nature,''
    P. Ishwar, V. Prabhakaran, and K. Ramchandran, ISIT, 2006. (IEEEXplore)
  53. ``Distributed Fountain Codes for Networked Storage,'' A. Dimakis, V. Prabhakaran, and K. Ramchandran,
    IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2006. (IEEEXplore)
  54. ``On the Role of Interaction Between Sensors in the CEO Problem,''V. Prabhakaran, K. Ramchandran, and D. Tse,
    Allerton Conference, 2004. (Paper)
  55. ``Rate region of the Quadratic Gaussian CEO Problem,'' V. Prabhakaran, D. Tse, and K. Ramchandran,
    ISIT, 2004. (Extended draft | IEEEXplore abstract)
  56. ``Towards a Theory for Video Coding using Distributed Compression Principles,''
    P. Ishwar, V. Prabhakaran, and K. Ramchandran, ICIP, 2003. (IEEEXplore)
  57. ``On Joint Classification and Compression in a Distributed Source Coding Framework,''
    P. Ishwar, V. Prabhakaran, and K. Ramchandran, IEEE Workshop on Statistical Signal Processing, 2003. (IEEEXplore)

Last modified: Friday 18 February, 2022