首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-19 DOI: 10.1109/TIT.2026.3662262
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2026.3662262","DOIUrl":"https://doi.org/10.1109/TIT.2026.3662262","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11400650","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TechRxiv: Share Your Preprint Research with the World! techxiv:与世界分享你的预印本研究!
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-19 DOI: 10.1109/TIT.2026.3663823
{"title":"TechRxiv: Share Your Preprint Research with the World!","authors":"","doi":"10.1109/TIT.2026.3663823","DOIUrl":"https://doi.org/10.1109/TIT.2026.3663823","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"2028-2028"},"PeriodicalIF":2.9,"publicationDate":"2026-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11400675","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Differential and Boomerang Properties of a Class of Binomials Over Finite Fields of Odd Characteristic 一类二项式在奇特征有限域上的微分性质和回旋性质
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-23 DOI: 10.1109/TIT.2026.3657603
Namhun Koo;Soonhak Kwon
In this paper, we investigate the differential and boomerang properties of a class of binomial $F_{r,u}(x) = x^{r}(1 + uchi (x))$ over the finite field $mathbb {F}_{p^{n}}$ , where $r = frac {p^{n}+1}{4}$ , $p^{n} equiv 3 pmod {4}$ , and $chi (x) = x^{frac {p^{n} -1}{2}}$ is the quadratic character in $mathbb {F}_{p^{n}}$ . We show that $F_{r,pm 1}$ is locally-PN with boomerang uniformity 0 when $p^{n} equiv 3 pmod {8}$ . To the best of our knowledge, it is the second known non-PN function class with boomerang uniformity 0, and the first such example over odd characteristic fields with $p gt 3$ . Moreover, we show that $F_{r,pm 1}$ is locally-APN with boomerang uniformity at most 2 when $p^{n} equiv 7 pmod {8}$ . We also provide complete classifications of the differential and boomerang spectra of $F_{r,pm 1}$ . Furthermore, we thoroughly investigate the differential uniformity of $F_{r,u}$ for $uin mathbb {F}_{p^{n}}^{*} setminus {pm 1}$ .
本文研究了有限域$mathbb {F}_{p^{n}}$上一类二项式$F_{r,u}(x) = x^{r}(1 + uchi (x))$的微分性质和回弹性质,其中$r = frac {p^{n}+1}{4}$, $p^{n} equiv 3 pmod {4}$, $chi (x) = x^{frac {p^{n} -1}{2}}$是$mathbb {F}_{p^{n}}$中的二次元。我们证明了$F_{r,pm 1}$是局部pn,当$p^{n} equiv 3 pmod {8}$。据我们所知,它是第二个已知的具有回飞均匀性0的非pn函数类,也是第一个具有$p gt 3$的奇特征域的此类示例。此外,我们还证明了$F_{r,pm 1}$是本地apn,当$p^{n} equiv 7 pmod {8}$时,其回飞棒均匀性不超过2。我们还提供了$F_{r,pm 1}$的微分光谱和回旋光谱的完整分类。此外,我们深入研究了$F_{r,u}$对$uin mathbb {F}_{p^{n}}^{*} setminus {pm 1}$的差分均匀性。
{"title":"On Differential and Boomerang Properties of a Class of Binomials Over Finite Fields of Odd Characteristic","authors":"Namhun Koo;Soonhak Kwon","doi":"10.1109/TIT.2026.3657603","DOIUrl":"https://doi.org/10.1109/TIT.2026.3657603","url":null,"abstract":"In this paper, we investigate the differential and boomerang properties of a class of binomial <inline-formula> <tex-math>$F_{r,u}(x) = x^{r}(1 + uchi (x))$ </tex-math></inline-formula> over the finite field <inline-formula> <tex-math>$mathbb {F}_{p^{n}}$ </tex-math></inline-formula>, where <inline-formula> <tex-math>$r = frac {p^{n}+1}{4}$ </tex-math></inline-formula>, <inline-formula> <tex-math>$p^{n} equiv 3 pmod {4}$ </tex-math></inline-formula>, and <inline-formula> <tex-math>$chi (x) = x^{frac {p^{n} -1}{2}}$ </tex-math></inline-formula> is the quadratic character in <inline-formula> <tex-math>$mathbb {F}_{p^{n}}$ </tex-math></inline-formula>. We show that <inline-formula> <tex-math>$F_{r,pm 1}$ </tex-math></inline-formula> is locally-PN with boomerang uniformity 0 when <inline-formula> <tex-math>$p^{n} equiv 3 pmod {8}$ </tex-math></inline-formula>. To the best of our knowledge, it is the second known non-PN function class with boomerang uniformity 0, and the first such example over odd characteristic fields with <inline-formula> <tex-math>$p gt 3$ </tex-math></inline-formula>. Moreover, we show that <inline-formula> <tex-math>$F_{r,pm 1}$ </tex-math></inline-formula> is locally-APN with boomerang uniformity at most 2 when <inline-formula> <tex-math>$p^{n} equiv 7 pmod {8}$ </tex-math></inline-formula>. We also provide complete classifications of the differential and boomerang spectra of <inline-formula> <tex-math>$F_{r,pm 1}$ </tex-math></inline-formula>. Furthermore, we thoroughly investigate the differential uniformity of <inline-formula> <tex-math>$F_{r,u}$ </tex-math></inline-formula> for <inline-formula> <tex-math>$uin mathbb {F}_{p^{n}}^{*} setminus {pm 1}$ </tex-math></inline-formula>.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1928-1942"},"PeriodicalIF":2.9,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Information for Authors IEEE信息理论汇刊:作者信息
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1109/TIT.2026.3651883
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2026.3651883","DOIUrl":"https://doi.org/10.1109/TIT.2026.3651883","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"C3-C3"},"PeriodicalIF":2.9,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11361354","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Task Semantic Communications With Bounded Privacy Leakage Constraint 具有有限隐私泄漏约束的多任务语义通信
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-14 DOI: 10.1109/TIT.2026.3654430
Amirreza Zamani;Mikael Skoglund
We study two semantic communication problems with privacy constraints considering single-task and multi-task scenarios. In both scenarios, an encoder has access to an information source arbitrarily correlated with some latent private information. In the single-task scenario, a user has a task, and the encoder designs a message to be revealed, which is called the semantic of the information source. Due to the privacy constraints, the semantic cannot be disclosed directly, so the encoder adds noise to produce data that can be disclosed. The goal is to design the disclosed message that maximizes the utility attained by the user while satisfying a privacy constraint. In the multi-task scenario, the user has $L$ tasks with priorities. Similarly, the encoder designs the disclosed message by adding noise to the semantic, which is optimized for the intended tasks. The goal is to design a mechanism to produce the disclosed message that maximizes the weighted sum of the utilities achieved by the user while satisfying a privacy constraint on the private data. In this work, we first consider the single-task scenario and design the added noise utilizing various methods, including the extended versions of the Functional Representation Lemma, Strong Functional Representation Lemma, and the separation technique. By designing the added noise, we obtain lower bounds with constructive proofs. We then study the multi-task scenario and derive a simple privacy mechanism design considering the source semantics. We show that in the multi-task scenario the main problem can be divided into multiple parallel single-task problems. In both scenarios, the obtained lower and upper bounds are studied considering different cases to study their tightness. We show that under some assumptions our proposed designs are optimal. We provide a few numerical experiments based on the MNIST dataset and medical applications to illustrate the designs and evaluate the bounds, considering both single and multi-task scenarios. Finally, we study an application where a semantic communication with two separate blind encoders is considered.
研究了单任务和多任务场景下具有隐私约束的两种语义通信问题。在这两种情况下,编码器都可以访问与某些潜在私有信息任意相关的信息源。在单任务场景中,用户有一个任务,编码器设计要显示的消息,这称为信息源的语义。由于隐私约束,语义不能直接公开,因此编码器添加噪声来产生可以公开的数据。目标是设计公开的消息,使用户获得的效用最大化,同时满足隐私约束。在多任务场景中,用户有$L$个具有优先级的任务。类似地,编码器通过向语义中添加噪声来设计公开的消息,该语义针对预期任务进行了优化。我们的目标是设计一种机制来生成公开的消息,使用户获得的实用程序的加权和最大化,同时满足对私有数据的隐私约束。在这项工作中,我们首先考虑单任务场景,并利用各种方法设计添加的噪声,包括功能表示引理的扩展版本,强功能表示引理和分离技术。通过设计附加噪声,得到了具有建设性证明的下界。然后,我们研究了多任务场景,并推导了一个考虑源语义的简单隐私机制设计。研究表明,在多任务场景下,主问题可以分解为多个并行的单任务问题。在这两种情况下,考虑不同情况对得到的下界和上界进行了研究,以研究它们的紧密性。我们证明,在某些假设下,我们提出的设计是最优的。我们提供了一些基于MNIST数据集和医疗应用的数值实验来说明设计和评估界限,考虑到单任务和多任务场景。最后,我们研究了一个使用两个独立盲编码器进行语义通信的应用。
{"title":"Multi-Task Semantic Communications With Bounded Privacy Leakage Constraint","authors":"Amirreza Zamani;Mikael Skoglund","doi":"10.1109/TIT.2026.3654430","DOIUrl":"https://doi.org/10.1109/TIT.2026.3654430","url":null,"abstract":"We study two semantic communication problems with privacy constraints considering single-task and multi-task scenarios. In both scenarios, an encoder has access to an information source arbitrarily correlated with some latent private information. In the single-task scenario, a user has a task, and the encoder designs a message to be revealed, which is called the semantic of the information source. Due to the privacy constraints, the semantic cannot be disclosed directly, so the encoder adds noise to produce data that can be disclosed. The goal is to design the disclosed message that maximizes the utility attained by the user while satisfying a privacy constraint. In the multi-task scenario, the user has <inline-formula> <tex-math>$L$ </tex-math></inline-formula> tasks with priorities. Similarly, the encoder designs the disclosed message by adding noise to the semantic, which is optimized for the intended tasks. The goal is to design a mechanism to produce the disclosed message that maximizes the weighted sum of the utilities achieved by the user while satisfying a privacy constraint on the private data. In this work, we first consider the single-task scenario and design the added noise utilizing various methods, including the extended versions of the Functional Representation Lemma, Strong Functional Representation Lemma, and the separation technique. By designing the added noise, we obtain lower bounds with constructive proofs. We then study the multi-task scenario and derive a simple privacy mechanism design considering the source semantics. We show that in the multi-task scenario the main problem can be divided into multiple parallel single-task problems. In both scenarios, the obtained lower and upper bounds are studied considering different cases to study their tightness. We show that under some assumptions our proposed designs are optimal. We provide a few numerical experiments based on the MNIST dataset and medical applications to illustrate the designs and evaluate the bounds, considering both single and multi-task scenarios. Finally, we study an application where a semantic communication with two separate blind encoders is considered.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1900-1927"},"PeriodicalIF":2.9,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information 基于编码的非均匀信息混合后量子密码系统
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-12 DOI: 10.1109/TIT.2026.3651210
Saar Tarnopolsky;Alejandro Cohen
We introduce a novel hybrid universal network coding cryptosystem (NU-HUNCC) for non-uniform messages in the finite blocklength regime that provides Post-Quantum (PQ) security at high communication rates. Recently, hybrid cryptosystems offered PQ security by premixing the data using secure linear coding schemes and encrypting only a small portion of it. The data is assumed to be uniformly distributed, an assumption that is often challenging to enforce. Standard fixed-length lossless source coding and compression schemes guarantee a uniform output in normalized divergence. Yet, this is not sufficient to guarantee security. We consider an efficient compression scheme uniform in non-normalized variational distance, that by utilizing a uniform sub-linear shared seed, guarantees PQ security. Specifically, for the proposed PQ cryptosystem, first, we provide an end-to-end practical coding scheme, NU-HUNCC, for non-uniform messages. Second, we show that NU-HUNCC is information-theoretic individually secured (IS) against an eavesdropper with access to any subset of the links and provide a converse proof against such an eavesdropper. Third, we introduce a modified security definition, individual semantic security under a chosen ciphertext attack (ISS-CCA1), and show that against an all-observing eavesdropper, NU-HUNCC satisfies its conditions. Finally, we provide an analysis of NU-HUNCC’s high data rate, low computational complexity, and the negligibility of the shared seed size.
我们介绍了一种新的混合通用网络编码密码系统(NU-HUNCC),用于有限块长度制度下的非均匀消息,该系统在高通信速率下提供后量子(PQ)安全性。最近,混合密码系统通过使用安全的线性编码方案对数据进行预混,并且只对其中的一小部分进行加密来提供PQ安全性。假设数据是均匀分布的,这个假设通常很难实现。标准的定长无损源编码和压缩方案保证了在归一化散度下的均匀输出。然而,这并不足以保证安全。考虑了一种在非归一化变分距离上一致的有效压缩方案,该方案利用一致的次线性共享种子来保证PQ的安全性。具体而言,对于所提出的PQ密码系统,首先,我们提供了一个端到端的实用编码方案,NU-HUNCC,用于非统一消息。其次,我们证明了NU-HUNCC在信息论上是独立安全的(is),可以防止访问任何链接子集的窃听者,并提供了针对此类窃听者的反向证明。第三,我们引入了一个改进的安全定义,即选择密文攻击下的个体语义安全(ss - cca1),并证明了针对全观察窃听者,NU-HUNCC满足其条件。最后,我们分析了NU-HUNCC的高数据速率、低计算复杂度和共享种子大小的可忽略性。
{"title":"Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information","authors":"Saar Tarnopolsky;Alejandro Cohen","doi":"10.1109/TIT.2026.3651210","DOIUrl":"https://doi.org/10.1109/TIT.2026.3651210","url":null,"abstract":"We introduce a novel hybrid universal network coding cryptosystem (NU-HUNCC) for non-uniform messages in the finite blocklength regime that provides Post-Quantum (PQ) security at high communication rates. Recently, hybrid cryptosystems offered PQ security by premixing the data using secure linear coding schemes and encrypting only a small portion of it. The data is assumed to be uniformly distributed, an assumption that is often challenging to enforce. Standard fixed-length lossless source coding and compression schemes guarantee a uniform output in <italic>normalized divergence</i>. Yet, this is not sufficient to guarantee security. We consider an efficient compression scheme uniform in <italic>non-normalized variational distance</i>, that by utilizing a uniform sub-linear shared seed, guarantees PQ security. Specifically, for the proposed PQ cryptosystem, first, we provide an end-to-end practical coding scheme, NU-HUNCC, for non-uniform messages. Second, we show that NU-HUNCC is information-theoretic individually secured (IS) against an eavesdropper with access to any subset of the links and provide a converse proof against such an eavesdropper. Third, we introduce a modified security definition, individual semantic security under a chosen ciphertext attack (ISS-CCA1), and show that against an all-observing eavesdropper, NU-HUNCC satisfies its conditions. Finally, we provide an analysis of NU-HUNCC’s high data rate, low computational complexity, and the negligibility of the shared seed size.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1850-1873"},"PeriodicalIF":2.9,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Random Fields Associated With Analytic Wavelet Transform 解析小波变换的随机场研究
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-05 DOI: 10.1109/TIT.2026.3650970
Gi-Ren Liu;Yuan-Chung Sheu;Hau-Tieng Wu
Despite the broad application of the analytic wavelet transform (AWT), a systematic statistical characterization of its magnitude and phase as inhomogeneous random fields on the time-frequency domain when the input is a random process remains underexplored. In this work, we study the magnitude and phase of the AWT as random fields on the time-frequency domain when the observed signal is a deterministic function plus additive stationary Gaussian noise. We derive their marginal and joint distributions, establish concentration inequalities that depend on the signal-to-noise ratio (SNR), and analyze their covariance structures. Based on these results, we derive an upper bound on the probability of incorrectly identifying the time-scale ridge of the clean signal, explore the regularity of scalogram contours, and study the relationship between AWT magnitude and phase. Our findings lay the groundwork for developing rigorous AWT-based algorithms in noisy environments.
尽管解析小波变换(AWT)得到了广泛的应用,但当输入是随机过程时,其幅度和相位在时频域上作为非均匀随机场的系统统计表征仍未得到充分的研究。在这项工作中,我们研究了当观测信号是确定性函数加加平稳高斯噪声时,AWT的幅值和相位作为时频域上的随机场。我们推导了它们的边际分布和联合分布,建立了依赖于信噪比(SNR)的浓度不等式,并分析了它们的协方差结构。在此基础上,推导了清洁信号时标脊错误识别概率的上界,探讨了尺度图轮廓的规律性,并研究了AWT震级与相位的关系。我们的发现为在嘈杂环境中开发严格的基于awt的算法奠定了基础。
{"title":"On Random Fields Associated With Analytic Wavelet Transform","authors":"Gi-Ren Liu;Yuan-Chung Sheu;Hau-Tieng Wu","doi":"10.1109/TIT.2026.3650970","DOIUrl":"https://doi.org/10.1109/TIT.2026.3650970","url":null,"abstract":"Despite the broad application of the analytic wavelet transform (AWT), a systematic statistical characterization of its magnitude and phase as inhomogeneous random fields on the time-frequency domain when the input is a random process remains underexplored. In this work, we study the magnitude and phase of the AWT as random fields on the time-frequency domain when the observed signal is a deterministic function plus additive stationary Gaussian noise. We derive their marginal and joint distributions, establish concentration inequalities that depend on the signal-to-noise ratio (SNR), and analyze their covariance structures. Based on these results, we derive an upper bound on the probability of incorrectly identifying the time-scale ridge of the clean signal, explore the regularity of scalogram contours, and study the relationship between AWT magnitude and phase. Our findings lay the groundwork for developing rigorous AWT-based algorithms in noisy environments.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"2005-2027"},"PeriodicalIF":2.9,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consensus Capacity of Noisy Broadcast Channels 噪声广播信道的共识容量
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-31 DOI: 10.1109/TIT.2025.3649987
Neha Sangwan;Varun Narayanan;Vinod M. Prabhakaran
We study communication with consensus over a broadcast channel—the receivers reliably decode the sender’s message when the sender is honest, and their decoder outputs agree even if the sender acts maliciously. We characterize the broadcast channels which permit this Byzantine consensus and determine their capacity. We show that communication with consensus is possible only when the broadcast channel has embedded in it a natural “common channel” whose output both receivers can unambiguously determine from their own channel outputs. Interestingly, in general, the consensus capacity may be larger than the point-to-point capacity of the common channel, i.e., while decoding, the receivers may make use of parts of their output signals on which they may not have consensus provided there are some parts (namely, the common channel output) on which they can agree.
我们研究了在广播信道上具有共识的通信——当发送者诚实时,接收方可靠地解码发送者的消息,即使发送者恶意行为,它们的解码器输出也一致。我们描述了允许这种拜占庭式共识的广播频道,并确定了它们的容量。我们表明,只有当广播频道嵌入了一个自然的“公共频道”,其输出两个接收器都可以明确地从自己的频道输出确定时,才有可能实现共识通信。有趣的是,一般来说,共识容量可能大于公共信道的点对点容量,即,在解码时,接收者可以使用他们可能没有共识的部分输出信号,只要有一些部分(即公共信道输出)是他们可以达成一致的。
{"title":"Consensus Capacity of Noisy Broadcast Channels","authors":"Neha Sangwan;Varun Narayanan;Vinod M. Prabhakaran","doi":"10.1109/TIT.2025.3649987","DOIUrl":"https://doi.org/10.1109/TIT.2025.3649987","url":null,"abstract":"We study communication with consensus over a broadcast channel—the receivers reliably decode the sender’s message when the sender is honest, and their decoder outputs agree even if the sender acts maliciously. We characterize the broadcast channels which permit this Byzantine consensus and determine their capacity. We show that communication with consensus is possible only when the broadcast channel has embedded in it a natural “common channel” whose output both receivers can unambiguously determine from their own channel outputs. Interestingly, in general, the consensus capacity may be larger than the point-to-point capacity of the common channel, i.e., while decoding, the receivers may make use of parts of their output signals on which they may not have consensus provided there are some parts (namely, the common channel output) on which they can agree.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1874-1899"},"PeriodicalIF":2.9,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Quantization for Matrix Multiplication 矩阵乘法的最优量化
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-30 DOI: 10.1109/TIT.2025.3649596
Or Ordentlich;Yury Polyanskiy
Recent work in machine learning community proposed multiple methods for performing lossy compression (quantization) of large matrices. This quantization is important for accelerating matrix multiplication (main component of large language models), which is often bottlenecked by the speed of loading these matrices from memory. Unlike classical vector quantization and rate-distortion theory, the goal of these new compression algorithms is to be able to approximate not the matrices themselves, but their matrix product. Specifically, given a pair of real matrices $A,B$ an encoder (compressor) is applied to each of them independently producing descriptions with $R$ bits per entry. These representations subsequently are used by the decoder to estimate matrix product $A^{top } B$ . In this work, we provide a non-asymptotic lower bound on the mean squared error of this approximation (as a function of rate $R$ ) for the case of matrices $A,B$ with iid Gaussian entries. Algorithmically, we construct a universal quantizer based on nested lattices with an explicit guarantee of approximation error for any (non-random) pair of matrices $A$ , $B$ in terms of only Frobenius norms $|bar {A}|_{F}, |bar {B}|_{F}$ and $|bar {A}^{top } bar {B}|_{F}$ , where $bar {A},bar {B}$ are versions of $A,B$ with zero-centered columns, respectively. For iid Gaussian matrices our quantizer achieves the lower bound and is, thus, asymptotically optimal. A practical low-complexity version of our quantizer achieves performance quite close to optimal. In addition, we derive rate-distortion function for matrix multiplication of iid Gaussian matrices, which exhibits an interesting phase-transition at $Rapprox 0.906$ bit/entry, showing necessity of Johnson-Lindestrauss dimensionality reduction (sketching) in the low-rate regime.
机器学习社区最近的工作提出了多种方法来执行大矩阵的有损压缩(量化)。这种量化对于加速矩阵乘法(大型语言模型的主要组成部分)非常重要,而从内存加载这些矩阵的速度常常成为瓶颈。与经典的矢量量化和率失真理论不同,这些新的压缩算法的目标不是能够近似矩阵本身,而是能够近似它们的矩阵乘积。具体来说,给定一对实矩阵$A,B$,对它们中的每一个独立地应用编码器(压缩器),每个条目产生$R$位的描述。解码器随后使用这些表示来估计矩阵乘积$A^{top } B$。在这项工作中,我们为具有iid高斯项的矩阵$A,B$的情况提供了该近似的均方误差(作为速率$R$的函数)的非渐近下界。在算法上,我们构建了一个基于嵌套格的通用量化器,该量化器对任何(非随机)矩阵对$A$, $B$具有明确的近似误差保证,仅根据Frobenius规范$|bar {A}|_{F}, |bar {B}|_{F}$和$|bar {A}^{top } bar {B}|_{F}$,其中$bar {A},bar {B}$分别是具有零中心列的$A,B$版本。对于iid高斯矩阵,我们的量化器达到下界,因此是渐近最优的。我们的量化器的一个实用的低复杂度版本实现了非常接近最佳的性能。此外,我们推导了iid高斯矩阵的矩阵乘法的速率失真函数,该函数在$Rapprox 0.906$ bit/entry处表现出有趣的相变,表明了在低速率下Johnson-Lindestrauss降维(草图)的必要性。
{"title":"Optimal Quantization for Matrix Multiplication","authors":"Or Ordentlich;Yury Polyanskiy","doi":"10.1109/TIT.2025.3649596","DOIUrl":"https://doi.org/10.1109/TIT.2025.3649596","url":null,"abstract":"Recent work in machine learning community proposed multiple methods for performing lossy compression (quantization) of large matrices. This quantization is important for accelerating matrix multiplication (main component of large language models), which is often bottlenecked by the speed of loading these matrices from memory. Unlike classical vector quantization and rate-distortion theory, the goal of these new compression algorithms is to be able to approximate not the matrices themselves, but their matrix product. Specifically, given a pair of real matrices <inline-formula> <tex-math>$A,B$ </tex-math></inline-formula> an encoder (compressor) is applied to each of them independently producing descriptions with <inline-formula> <tex-math>$R$ </tex-math></inline-formula> bits per entry. These representations subsequently are used by the decoder to estimate matrix product <inline-formula> <tex-math>$A^{top } B$ </tex-math></inline-formula>. In this work, we provide a non-asymptotic lower bound on the mean squared error of this approximation (as a function of rate <inline-formula> <tex-math>$R$ </tex-math></inline-formula>) for the case of matrices <inline-formula> <tex-math>$A,B$ </tex-math></inline-formula> with iid Gaussian entries. Algorithmically, we construct a universal quantizer based on nested lattices with an explicit guarantee of approximation error for any (non-random) pair of matrices <inline-formula> <tex-math>$A$ </tex-math></inline-formula>, <inline-formula> <tex-math>$B$ </tex-math></inline-formula> in terms of only Frobenius norms <inline-formula> <tex-math>$|bar {A}|_{F}, |bar {B}|_{F}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$|bar {A}^{top } bar {B}|_{F}$ </tex-math></inline-formula>, where <inline-formula> <tex-math>$bar {A},bar {B}$ </tex-math></inline-formula> are versions of <inline-formula> <tex-math>$A,B$ </tex-math></inline-formula> with zero-centered columns, respectively. For iid Gaussian matrices our quantizer achieves the lower bound and is, thus, asymptotically optimal. A practical low-complexity version of our quantizer achieves performance quite close to optimal. In addition, we derive rate-distortion function for matrix multiplication of iid Gaussian matrices, which exhibits an interesting phase-transition at <inline-formula> <tex-math>$Rapprox 0.906$ </tex-math></inline-formula> bit/entry, showing necessity of Johnson-Lindestrauss dimensionality reduction (sketching) in the low-rate regime.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 3","pages":"1943-1972"},"PeriodicalIF":2.9,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146216619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Minimax Empirical Bayes Predictive Densities 极小极大经验贝叶斯预测密度
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-25 DOI: 10.1109/TIT.2025.3648620
Éric Marchand;William E. Strawderman
For estimating the density of $Y|mu sim N_{d}(mu , nu I_{d})$ based on $X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$ with known $nu , sigma ^{2}_{X}$ , we consider the class $mathcal {P}$ of “extended plug-in” predictive densities $hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$ . For a given prior density $pi $ for $mu $ and Kullback–Leibler loss, we investigate the optimal choice $hat {q}_{eb,pi }$ obtained by minimizing the expected posterior loss among $hat {q} in mathcal {P}$ , as initially proposed by Okudo and Komaki (2024). With $hat {q}_{eb,pi }$ having a simple form and a appealing alternative to the exact Bayesian predictive density, we investigate its Kullback–Leibler risk performance. Our main finding consists, for $d geq 3$ and a given superharmonic prior density $pi $ , in the determination of a lower cut-off point $bar {nu }$ such that $hat {q}_{eb,pi }$ dominates the benchmark minimum risk and minimax predictive density for $nu geq bar {nu }$ . Specific analyses are carried out and our results are illustrated for a pseudo-Bayes marginal density and a subclass of Strawderman prior densities.
为了在已知$nu , sigma ^{2}_{X}$的情况下基于$X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$估计$Y|mu sim N_{d}(mu , nu I_{d})$的密度,我们考虑“扩展插件”预测密度$hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$的类$mathcal {P}$。对于$mu $和Kullback-Leibler损失的给定先验密度$pi $,我们研究了Okudo和Komaki(2024)最初提出的通过最小化$hat {q} in mathcal {P}$的预期后验损失获得的最优选择$hat {q}_{eb,pi }$。由于$hat {q}_{eb,pi }$具有简单的形式和精确贝叶斯预测密度的一个吸引人的替代方案,我们研究了它的Kullback-Leibler风险性能。我们的主要发现包括,对于$d geq 3$和给定的超谐波先验密度$pi $,在确定较低的截止点$bar {nu }$时,使得$hat {q}_{eb,pi }$在$nu geq bar {nu }$的基准最小风险和最大最小预测密度中占主导地位。具体的分析进行了,我们的结果说明了伪贝叶斯边际密度和一个子类的Strawderman先验密度。
{"title":"On Minimax Empirical Bayes Predictive Densities","authors":"Éric Marchand;William E. Strawderman","doi":"10.1109/TIT.2025.3648620","DOIUrl":"https://doi.org/10.1109/TIT.2025.3648620","url":null,"abstract":"For estimating the density of <inline-formula> <tex-math>$Y|mu sim N_{d}(mu , nu I_{d})$ </tex-math></inline-formula> based on <inline-formula> <tex-math>$X|mu sim N_{d}(mu , sigma ^{2}_{X} I_{d})$ </tex-math></inline-formula> with known <inline-formula> <tex-math>$nu , sigma ^{2}_{X}$ </tex-math></inline-formula>, we consider the class <inline-formula> <tex-math>$mathcal {P}$ </tex-math></inline-formula> of “extended plug-in” predictive densities <inline-formula> <tex-math>$hat {q} sim N_{d}(hat {mu }, hat {nu } I_{d})$ </tex-math></inline-formula>. For a given prior density <inline-formula> <tex-math>$pi $ </tex-math></inline-formula> for <inline-formula> <tex-math>$mu $ </tex-math></inline-formula> and Kullback–Leibler loss, we investigate the optimal choice <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> obtained by minimizing the expected posterior loss among <inline-formula> <tex-math>$hat {q} in mathcal {P}$ </tex-math></inline-formula>, as initially proposed by Okudo and Komaki (2024). With <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> having a simple form and a appealing alternative to the exact Bayesian predictive density, we investigate its Kullback–Leibler risk performance. Our main finding consists, for <inline-formula> <tex-math>$d geq 3$ </tex-math></inline-formula> and a given superharmonic prior density <inline-formula> <tex-math>$pi $ </tex-math></inline-formula>, in the determination of a lower cut-off point <inline-formula> <tex-math>$bar {nu }$ </tex-math></inline-formula> such that <inline-formula> <tex-math>$hat {q}_{eb,pi }$ </tex-math></inline-formula> dominates the benchmark minimum risk and minimax predictive density for <inline-formula> <tex-math>$nu geq bar {nu }$ </tex-math></inline-formula>. Specific analyses are carried out and our results are illustrated for a pseudo-Bayes marginal density and a subclass of Strawderman prior densities.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"72 2","pages":"1232-1239"},"PeriodicalIF":2.9,"publicationDate":"2025-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146015950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1