photo
Vinod M. Prabhakaran

School of Technology and Computer Science
Tata Institute of Fundamental Research
Homi Bhabha Road
Mumbai, India 400005
Phone: +91 22 2278 2081
Email: v...@tifr.res.in (fill in the dots!)

Selected Publications

  1. ``Interactive Secure Function Computation,'' D. Data, G. Kurri, J. Ravi, and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 66, no. 9, pp. 5492-5521, September 2020. (IEEEXplore | arXiv)
  2. ``Joint State Estimation and Communication Over a State-Dependent Gaussian Multiple Access Channel,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    IEEE Transactions on Communications, vol. 67, no. 10, pp. 6743-6752, October 2019. (IEEEXplore)
  3. ``Plausible Deniability over Broadcast Channels,'' M. Bakshi and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 64, no. 12, pp. 7883-7902, December 2018. (IEEEXplore | arXiv)
  4. ``Private Coded Caching,'' V. Ravindrakumar, P. Panda, N. Karamchandani, and V. Prabhakaran,
    IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 685-694, March 2018. (IEEEXplore | arXiv)
  5. ``Communication in the Presence of a State-Aware Adversary,'' A. Budkuley, B. Dey, and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 63, no. 11, pp. 7396-7419, November 2017. (IEEEXplore | arXiv)
  6. ``Wiretapped Oblivious Transfer,'' M. Mishra, B. Dey, V. Prabhakaran and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2560-2595, April 2017. (IEEEXplore | arXiv)
  7. ``Capacity Results for Multicasting Nested Message Sets over Combination Networks,'' S. Bidokhti, V. Prabhakaran, and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 62, no. 9, pp. 4968-4992, September 2016. (IEEEXplore | arXiv)
  8. ``Communication and Randomness Lower Bounds for Secure Computation,'' D. Data, V. Prabhakaran, and M. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 62, no. 7, pp. 3901--3929, July 2016. (IEEEXplore | arXiv | conference version from CRYPTO 2014).
  9. ``An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback,'' L. Czap, V. Prabhakaran, C. Fragouli, and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 62, no. 5, pp. 2430 - 2480, May 2016. (IEEEXplore)
  10. ``Wireless Network Security: Building on Erasures,'' C. Fragouli, V. Prabhakaran, L. Czap, and S. Diggavi,
    Proceedings of the IEEE, vol. 103, no. 10, pp. 1826 - 1840, October 2015. (IEEEXplore)
  11. ``Secret Communication over Broadcast Erasure Channels with State-feedback,'' L. Czap, V. Prabhakaran, C. Fragouli, and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 61, no. 9, pp. 4788 - 4808, September 2015. (IEEEXplore)
  12. ``Secure Network Coding With Erasures and Feedback,'' L. Czap, C. Fragouli, V. Prabhakaran, and S. Diggavi,
    IEEE Transactions on Information Theory, vol. 61, no. 4, pp. 1667-1686, April 2015. (IEEEXplore)
  13. ``Assisted Common Information with an Application to Secure Two-Party Sampling,'' V. Prabhakaran and M. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 60, no. 6, pp. 3413-3434, June 2014. (IEEEXplore | arXiv)
  14. ``Is Non-Unique Decoding Necessary?,'' S.S. Bidokhti and V. Prabhakaran,
    IEEE Transactions on Information Theory, vol. 60, no. 5, pp. 2594-2610, May 2014. (IEEEXplore | arXiv)
  15. ``Interference Channels With Half-Duplex Source Cooperation ,'' R. Wu, V. Prabhakaran, P. Viswanath, and Y. Wang,
    IEEE Transactions on Information Theory, vol. 60, no. 3, pp. 1753-1781, March 2014. (IEEEXplore | arXiv)
  16. ``Secrecy via Sources and Channels,'' V. Prabhakaran, K. Eswaran, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 58, no. 11, pp. 6747-6765, November 2012. (IEEEXplore | arXiv)
  17. ``Hybrid Digital-Analog Codes for Source-Channel Broadcast of Gaussian Sources over Gaussian Channels,'' V. Prabhakaran, R. Puri, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 57, no. 7, pp. 4573-4588, July, 2011. (IEEEXplore | arXiv)
  18. ``Interference Channel with Source Cooperation,'' V. Prabhakaran and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 156-186, January 2011. (IEEEXplore | arXiv)
  19. ``Interference Channel with Destination Cooperation,'' V. Prabhakaran and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 187-209, January 2011.
    (IEEEXplore | arXiv)
  20. ``The Two User Gaussian Compound Interference Channels,'' A. Raja, V. Prabhakaran, and P. Viswanath,
    IEEE Transactions on Information Theory, vol. 55, no. 11, pp. 5100-5120, November 2009. (IEEEXplore | arXiv)
  21. ``Colored Gaussian source-channel broadcast for heterogeneous (analog/digital) receivers,'' V. Prabhakaran, R. Puri, and K. Ramchandran,
    IEEE Transactions on Information Theory, vol. 54, no. 4, pp. 1807-1814, April, 2008. (IEEEXplore)
  22. ``Decentralized Erasure Codes for Distributed Networked Storage,'' A. Dimakis, V. Prabhakaran, and K. Ramchandran,
    Special Issue of IEEE Transactions on Information Theory: Networking and Information Theory, July, 2006. (IEEEXplore | arXiv)
    The conference version received the best paper award at the IEEE/ACM Symposium on Information Processing in Sensor Networks (IPSN), 2005.
  23. ``On Compressing Encrypted Data,'' M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, and K. Ramchandran,
    IEEE Transactions on Signal Processing: Networking and Information Theory, October, 2004. (IEEEXplore)
  1. ``Zero-Communication Reductions,'' V. Narayanan, M. Prabhakaran, and V. Prabhakaran,
    Theory of Cryptography Conference (TCC), 2020. (full version at ePrint archive | Springer)
  2. ``Cryptography from One-Way Communication: On Completeness of Finite Channels,'' S. Agrawal, Y. Ishai, E. Kushilevitz, V. Narayanan, M. Prabhakaran, V. Prabhakaran, and A. Rosen,
    ASIACRYPT 2020. (Springer)
  3. ``Private Two-Terminal Hypothesis Testing,'' V. Narayanan, M. Mishra and V. Prabhakaran,
    IEEE International Symposium on Information Theory (ISIT), 2020. (IEEEXplore)
  4. ``Secure Computation to Hide Functions of Inputs,'' G. Kurri and V. Prabhakaran,
    ISIT, 2020. (IEEEXplore)
  5. "When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel?" A. Ravi, S. Pillai, V. Prabhakaran, and M. Wigger,
    ISIT, 2020. (IEEEXplore)
  6. ``Strong Coordination with Side Information,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    ISIT, 2020. (IEEEXplore)
  7. ``Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation,'' S. Pillai, M. Prabhakaran, V. Prabhakaran, and S. Sridhar,
    INDOCRYPT 2019. (Springer)
  8. ``Multiple Access Channels with Byzantine Users,'' N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    IEEE Information Theory Workshop (ITW), 2019. (IEEEXplore | Extended version at arXiv)
  9. ``Coordination via Shared Randomness,'' G. Kurri and V. Prabhakaran,
    ITW, 2019. (IEEEXplore | Extended version at arXiv)
  10. ``Multiple access channels with adversarial users,'' N. Sangwan, M. Bakshi, B. Dey, and V. Prabhakaran,
    ISIT, 2019. (IEEEXplore | Extended version at arXiv)
  11. ``Message and state communication over channels with action dependent states,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    ISIT, 2019. (IEEEXplore)
  12. ``Channels with action dependent states and common reconstructions,'' V. Ramachandran, S. Pillai, and V. Prabhakaran,
    National Conference on Communications (NCC), 2019. Best paper award. (IEEEXplore)
  13. ``Oblivious Transfer in Incomplete Networks,'' V. Narayanan and V. Prabhakaran,
    Theory of Cryptography Conference (TCC), 2018. (full version at ePrint archive | Springer)
  14. ``On the Rate Distortion Function of Arbitrarily Varying Remote Sources,'' A. Budkuley, B. Dey, S. Jaggi, and V. Prabhakaran,
    ITW, 2018. (IEEEXplore)
  15. ``State-Dependent Gaussian Broadcast Channel with Common State Reconstructions,'' V. Ramachandran, M. Sreenivasan, S. Pillai, and V. Prabhakaran,
    International Symposium on Information Theory and Its Applications (ISITA), 2018. (IEEEXplore)
  16. ``Coordination Using Individually Shared Randomness,'' G. Kurri, V. Prabhakaran, and A. Sarwate,
    ISIT, 2018. (IEEEXplore | arXiv)
  17. ``Private Index Coding,'' V. Narayanan. J. Ravi, V. Mishra, B. Dey, N. Karamchandani, and V. Prabhakaran,
    ISIT, 2018. (IEEEXplore)
  18. ``Secure Computation of Randomized Functions: Further Results,'' D. Data and V. Prabhakaran,
    ITW, 2017. (arXiv)
  19. ``Coding for Arbitrarily Varying Remote Sources,'' A Budkuley, B. Dey, and V. Prabhakaran,
    ISIT, 2017. (arXiv)
  20. ``Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound,'' M. Prabhakaran and V. Prabhakaran,
    43rd International Colloquium of Automata, Languages and Programming (ICALP), 2016. (DROPS | arXiv)
  21. ``Lower Bounds and Optimal Protocols for Three-Party Secure Computation,'' S. Rajan, S. Rajakrishnan, A. Thangaraj, and V. Prabhakaran,
    ISIT, 2016. (IEEEXplore)
  22. ``Lower Bounds for Interactive Function Computation via Wyner Common Information,'' S. Rajakrishnan, S. Rajan, and V. Prabhakaran,
    National Conference on Communications (NCC), 2016. (arXiv)
  23. ``Coded Caching in Hybrid Networks,'' A. Sridhar, N. Karamchandani, and V. Prabhakaran,
    NCC, 2016.
  24. ``Private Data Transfer over a Broadcast Channel,'' M. Mishra, T. Sharma, B. Dey, and V. Prabhakaran,
    ISIT, 2015. (arXiv)
  25. ``On the Noisy Feedback Capacity of Gaussian Broadcast Channels,'' S. Pillai and V. Prabhakaran.
    ITW, Jerusalem, 2015. (arXiv)
  26. ``Critical Database Size for Effective Caching,'' Ajaykrishnan N., N. Prem, V. Prabhakaran, R. Vaze,
    NCC, 2015. (arXiv)
  27. ``A New Upperbound for the Oblivious Transfer Capacity of Discrete Memoryless Channels,'' S. Rao and V. Prabhakaran,
    ITW, 2014. (arXiv)
  28. ``How to Securely Compute the Modulo-Two Sum of Binary Sources,'' D. Data, B. Dey, M. Mishra, V. Prabhakaran,
    ITW, 2014. (arXiv)
  29. ``Correlated Jamming in a Joint Source Channel Communication System ,'' A Budkuley, B. Dey, and V. Prabhakaran,
    ISIT, 2014. (arXiv)
  30. ``Assisted Sampling of Correlated Sources,'' V. Prabhakaran and A. Sarwate,
    ISIT, 2013.
  31. ``Using Feedback for Secrecy over Graphs,'' S. Mishra, C. Fragouli, V. Prabhakaran, and S. Diggavi,
    ISIT, 2013.
  32. ``Estimation of Bandlimited Signals from the Signs of Noisy Samples,'' A. Kumar and V. Prabhakaran,
    IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2013. (extended arXiv draft)
  33. ``On Secure Multiparty Sampling For More than Two Parties,'' M. Prabhakaran and V. Prabhakaran,
    ITW, 2012.
  34. ``On Multicasting Nested Message Sets Over Combination Networks,'' S. Saeedi, V. Prabhakaran, and S. Diggavi,
    ITW, 2012.
  35. ``Untrusting Network Coding,'' Y. Büyükalp, G. Maatouk, V. Prabhakaran, and C. Fragouli,
    NETCOD, 2012. (IEEEXplore)
  36. ``Secure Distributive Storage of Decentralized Data: Can Interaction Help?,'' S. El Rouayheb, V. Prabhakaran, and K. Ramchandran,
    ISIT, 2010. (IEEEXplore)
  37. ``On Degraded Two Message Set Broadcasting,'' S. S. Bidokthi, S. Diggavi, C. Fragouli, and V. Prabhakaran,
    ITW , October 2009. (IEEEXplore)
  38. ``Communication by Sleeping: Optimizing a Relay Channel Under Wake and Transmit Power Costs,'' V. Prabhakaran and P.R. Kumar,
    ISIT, 2009. (IEEEXplore)
  39. ``Opportunistic Interference Management,'' N. Khude, V. Prabhakaran, and P. Viswanath,
    ISIT, July 2009. (IEEEXplore)
  40. ``Reversibility in Linear Deterministic Networks under Linear Coding,'' A. Raja, V. Prabhakaran and P. Viswanath,
    ITW, June, 2009. (arXiv)
  41. ``Harnessing Bursty Interference,'' N. Khude, V. Prabhakaran, and P. Viswanath,
    ITW, June 2009. (IEEEXplore)
  42. ``The Secrecy Capacity of a Class of Non-degraded Parallel Gaussian Compound Wiretap Channels,'' T. Liu, V. Prabhakaran, and S. Vishwanath,
    ISIT, 2008. (IEEEXplore).
  43. ``Broadcasting with Degraded Message Sets: A Deterministic Approach,'' V. Prabhakaran, S. Diggavi, and D. Tse,
    Allerton Conference, 2007. (Paper)
  44. ``A Separation Result for Secure Communication,'' V. Prabhakaran and K. Ramchandran,
    Allerton Conference, 2007. (Paper)
  45. ``On Secure Distributed Source Coding,'' V. Prabhakaran and K. Ramchandran,
    ITW, Lake Tahoe, 2007. (IEEEXplore)
  46. `` Channel Coding with Strictly Causal Colored Side-Information at Transmitter,'' V. Prabhakaran, D. Tse, and K. Ramchandran,
    ISIT, 2007. (IEEEXplore)
  47. ``On the Role of Helpers in Peer-to-Peer File Download Systems: Design, Analysis and Simulation,'' J. Wang, C. Yeo, V. Prabhakaran, and K. Ramchandran,
    International Workshop on Peer-to-Peer Systems (IPTPS), 2007. (Microsoft Research)
  48. ``Syndrome-based Robust Video Transmission over Networks with Bursty Losses,'' J. Wang, V. Prabhakaran, and K. Ramchandran,
    IEEE International Conference on Image Processing (ICIP), 2006. (IEEEXplore)
  49. ``On Source Coding with Side-Information Under Ambiguous State of Nature,'' P. Ishwar, V. Prabhakaran, and K. Ramchandran,
    ISIT, 2006. (IEEEXplore)
  50. ``Distributed Fountain Codes for Networked Storage,'' A. Dimakis, V. Prabhakaran, and K. Ramchandran,
    IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2006. (IEEEXplore)
  51. ``On the Role of Interaction Between Sensors in the CEO Problem,''V. Prabhakaran, K. Ramchandran, and D. Tse,
    Allerton Conference, 2004. (Paper)
  52. ``Rate region of the Quadratic Gaussian CEO Problem,'' V. Prabhakaran, D. Tse, and K. Ramchandran,
    ISIT, 2004. (Extended draft | IEEEXplore abstract)
  53. ``Towards a Theory for Video Coding using Distributed Compression Principles,'' P. Ishwar, V. Prabhakaran, and K. Ramchandran,
    ICIP, 2003. (IEEEXplore)
  54. ``On Joint Classification and Compression in a Distributed Source Coding Framework,'' P. Ishwar, V. Prabhakaran, and K. Ramchandran,
    IEEE Workshop on Statistical Signal Processing, 2003. (IEEEXplore)

Last modified: Thursday 14 January, 2021