首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
Generator Polynomials of Cyclic Expurgated or Extended Goppa Codes 循环删节码或扩展 Goppa 码的生成多项式
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TIT.2024.3462712
Xue Jia;Fengwei Li;Huan Sun;Qin Yue
Classical Goppa codes are a well-known class of codes with applications in code-based cryptography, which are a special case of alternant codes. Many papers are devoted to the search for Goppa codes with a cyclic extension or with a cyclic parity-check subcode. Let $Bbb F_{q}$ be a finite field with $q=2^{l}$ elements, where l is a positive integer. In this paper, we determine all the generator polynomials of cyclic expurgated or extended Goppa codes under some prescribed permutations induced by the projective general linear automorphism $A in PGL_{2}(Bbb F_{q})$ . Moreover, we provide some examples to support our findings.
经典 Goppa 码是一类著名的码,应用于基于代码的密码学,是交替码的一种特例。许多论文都致力于寻找具有循环扩展或循环奇偶校验子码的 Goppa 码。假设 $Bbb F_{q}$ 是一个有限域,其元素为 $q=2^{l}$,其中 l 为正整数。在本文中,我们确定了在 PGL_{2}(Bbb F_{q})$ 中的投影一般线性自动态 $A 所诱导的一些规定置换下,循环删节码或扩展 Goppa 码的所有生成多项式。此外,我们还提供了一些例子来支持我们的发现。
{"title":"Generator Polynomials of Cyclic Expurgated or Extended Goppa Codes","authors":"Xue Jia;Fengwei Li;Huan Sun;Qin Yue","doi":"10.1109/TIT.2024.3462712","DOIUrl":"10.1109/TIT.2024.3462712","url":null,"abstract":"Classical Goppa codes are a well-known class of codes with applications in code-based cryptography, which are a special case of alternant codes. Many papers are devoted to the search for Goppa codes with a cyclic extension or with a cyclic parity-check subcode. Let \u0000<inline-formula> <tex-math>$Bbb F_{q}$ </tex-math></inline-formula>\u0000 be a finite field with \u0000<inline-formula> <tex-math>$q=2^{l}$ </tex-math></inline-formula>\u0000 elements, where l is a positive integer. In this paper, we determine all the generator polynomials of cyclic expurgated or extended Goppa codes under some prescribed permutations induced by the projective general linear automorphism \u0000<inline-formula> <tex-math>$A in PGL_{2}(Bbb F_{q})$ </tex-math></inline-formula>\u0000. Moreover, we provide some examples to support our findings.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7711-7722"},"PeriodicalIF":2.2,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142252676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Publication Information 电气和电子工程师学会《信息论学报》出版信息
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TIT.2024.3455153
{"title":"IEEE Transactions on Information Theory Publication Information","authors":"","doi":"10.1109/TIT.2024.3455153","DOIUrl":"10.1109/TIT.2024.3455153","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"C2-C2"},"PeriodicalIF":2.2,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10682504","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142252682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication-Constrained Secret Key Generation: Second-Order Bounds 通信受限密钥生成:二阶边界
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TIT.2024.3460474
Henri Hentilä;Yanina Y. Shkel;Visa Koivunen
We study communication-constrained secret key generation, where two legitimate parties would like to generate a secret key using communication subject to a rate constraint. The problem is studied in the finite-blocklength regime. In this regime, the use of auxiliary random variables subject to Markov chain conditions in the corresponding asymptotic bounds has proven to make most existing proof techniques insufficient. However, two recently proposed proof techniques – one for the achievability side based on Poisson matching, and another for the converse side based on reverse hypercontractivity – allow us to overcome these issues to some extent. Based on these techniques, novel one-shot and second-order achievability and converse bounds are derived for the problem. While the second-order bounds do not coincide, leaving a precise second-order characterization of the problem an open issue, they improve upon the previously known tightest bounds. The second-order bounds are demonstrated for two simple sources: the binary symmetric source and the Gaussian symmetric source. For the binary source, we find that the gap between the two bounds is mainly due to an unwanted constant in the converse bound, and the non-convexity of the achievability bound.
我们研究的是通信受限密钥生成问题,即合法双方希望使用通信来生成密钥,但通信速率受限。该问题是在有限块长机制下研究的。在这种情况下,在相应的渐近边界中使用受马尔科夫链条件限制的辅助随机变量,已被证明使大多数现有的证明技术不够充分。然而,最近提出的两种证明技术--一种是基于泊松匹配的可实现性证明技术,另一种是基于反向超契约性的反向证明技术--让我们在一定程度上克服了这些问题。基于这些技术,我们推导出了该问题的新颖的一阶和二阶可实现性及收敛性边界。虽然二阶界限并不重合,因此该问题的精确二阶特征描述仍是一个未决问题,但它们改进了之前已知的最严格界限。我们针对两个简单的信号源:二元对称信号源和高斯对称信号源演示了二阶边界。对于二元对称源,我们发现两个界值之间的差距主要是由于反向界值中一个不必要的常数和可实现性界值的非凸性造成的。
{"title":"Communication-Constrained Secret Key Generation: Second-Order Bounds","authors":"Henri Hentilä;Yanina Y. Shkel;Visa Koivunen","doi":"10.1109/TIT.2024.3460474","DOIUrl":"10.1109/TIT.2024.3460474","url":null,"abstract":"We study communication-constrained secret key generation, where two legitimate parties would like to generate a secret key using communication subject to a rate constraint. The problem is studied in the finite-blocklength regime. In this regime, the use of auxiliary random variables subject to Markov chain conditions in the corresponding asymptotic bounds has proven to make most existing proof techniques insufficient. However, two recently proposed proof techniques – one for the achievability side based on Poisson matching, and another for the converse side based on reverse hypercontractivity – allow us to overcome these issues to some extent. Based on these techniques, novel one-shot and second-order achievability and converse bounds are derived for the problem. While the second-order bounds do not coincide, leaving a precise second-order characterization of the problem an open issue, they improve upon the previously known tightest bounds. The second-order bounds are demonstrated for two simple sources: the binary symmetric source and the Gaussian symmetric source. For the binary source, we find that the gap between the two bounds is mainly due to an unwanted constant in the converse bound, and the non-convexity of the achievability bound.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8180-8203"},"PeriodicalIF":2.2,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142252677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Cross-Correlation of Golomb Costas Permutations 关于戈洛姆-科斯塔斯排列的交叉相关性
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TIT.2024.3460189
Huaning Liu;Arne Winterhof
In the most interesting case of safe prime powers q, Gómez and Winterhof showed that a subfamily of the family of Golomb Costas permutations of ${1,2,ldots,q-2}$ of size $varphi (q-1)$ has maximal cross-correlation of order of magnitude at most $q^{1/2}$ . In this paper we study a larger family of Golomb Costas permutations and prove a weaker bound on its maximal cross-correlation. Considering the whole family of Golomb Costas permutations we show that large cross-correlations are very rare. Finally, we collect several conditions for a small cross-correlation of two Costas permutations. Our main tools are the Weil bound and the Szemerédi-Trotter theorem for finite fields.
在最有趣的安全素数 q 的情况下,戈麦斯和温特霍夫证明了大小为 $varphi (q-1)$ 的 ${1,2,ldots,q-2}$ 的戈隆-科斯塔斯排列族的一个子族具有数量级最多为 $q^{1/2}$ 的最大交叉相关性。 在本文中,我们研究了一个更大的戈隆-科斯塔斯排列族,并证明了其最大交叉相关性的一个较弱约束。考虑到整个哥伦布-科斯塔斯排列族,我们证明大的交叉相关非常罕见。最后,我们收集了两个科斯塔斯排列的小交叉相关性的几个条件。我们的主要工具是有限域的韦尔约束和塞梅尔迪-特罗特定理。
{"title":"On the Cross-Correlation of Golomb Costas Permutations","authors":"Huaning Liu;Arne Winterhof","doi":"10.1109/TIT.2024.3460189","DOIUrl":"10.1109/TIT.2024.3460189","url":null,"abstract":"In the most interesting case of safe prime powers q, Gómez and Winterhof showed that a subfamily of the family of Golomb Costas permutations of \u0000<inline-formula> <tex-math>${1,2,ldots,q-2}$ </tex-math></inline-formula>\u0000 of size \u0000<inline-formula> <tex-math>$varphi (q-1)$ </tex-math></inline-formula>\u0000 has maximal cross-correlation of order of magnitude at most \u0000<inline-formula> <tex-math>$q^{1/2}$ </tex-math></inline-formula>\u0000. In this paper we study a larger family of Golomb Costas permutations and prove a weaker bound on its maximal cross-correlation. Considering the whole family of Golomb Costas permutations we show that large cross-correlations are very rare. Finally, we collect several conditions for a small cross-correlation of two Costas permutations. Our main tools are the Weil bound and the Szemerédi-Trotter theorem for finite fields.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7848-7852"},"PeriodicalIF":2.2,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142268575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectral Universality in Regularized Linear Regression With Nearly Deterministic Sensing Matrices 具有近乎确定性传感矩阵的正则化线性回归中的频谱普遍性
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1109/TIT.2024.3458953
Rishabh Dudeja;Subhabrata Sen;Yue M. Lu
It has been observed that the performances of many high-dimensional estimation problems are universal with respect to underlying sensing (or design) matrices. Specifically, matrices with markedly different constructions seem to achieve identical performance if they share the same spectral distribution and have “generic” singular vectors. We prove this universality phenomenon for the case of convex regularized least squares (RLS) estimators under a linear regression model with additive Gaussian noise. Our main contributions are two-fold: (1) We introduce a notion of universality classes for sensing matrices, defined through a set of deterministic conditions that fix the spectrum of the sensing matrix and precisely capture the notion of generic singular vectors; (2) We show that for all sensing matrices that lie in the same universality class, the dynamics of the proximal gradient descent algorithm for solving the regression problem, as well as the performance of RLS estimators themselves (under additional strong convexity conditions) are asymptotically identical. In addition to including i.i.d. Gaussian and rotational invariant matrices as special cases, our universality class also contains highly structured, strongly dependent, and even (nearly) deterministic matrices. Examples of the latter include randomly signed versions of incoherent tight frames and randomly subsampled Hadamard transforms. As a consequence of this universality principle, the asymptotic performance of regularized linear regression on many structured matrices constructed with limited randomness can be characterized by using the rotationally invariant ensemble as an equivalent yet mathematically more tractable surrogate.
据观察,许多高维估计问题的性能与底层传感(或设计)矩阵有关。具体来说,如果矩阵具有相同的频谱分布并具有 "通用 "奇异向量,那么具有明显不同结构的矩阵似乎可以获得相同的性能。我们针对具有加性高斯噪声的线性回归模型下凸正则化最小二乘(RLS)估计器的情况,证明了这一普遍性现象。我们的主要贡献有两个方面:(1) 我们引入了传感矩阵普遍性类别的概念,通过一组确定性条件来定义,这些条件固定了传感矩阵的频谱,并精确地捕捉到了通用奇异向量的概念;(2) 我们证明,对于所有位于同一普遍性类别的传感矩阵,求解回归问题的近似梯度下降算法的动态以及 RLS 估计器本身的性能(在附加的强凸性条件下)在渐近上是相同的。除了包括作为特例的 i.i.d. 高斯矩阵和旋转不变矩阵外,我们的普遍性类别还包括高度结构化、强依赖性甚至(近乎)确定性矩阵。后者的例子包括不连贯紧帧的随机符号版本和随机子采样哈达玛变换。由于这一普遍性原理,可以使用旋转不变集合作为等价但在数学上更容易理解的替代物,来描述在许多结构矩阵上用有限随机性构建的正则化线性回归的渐进性能。
{"title":"Spectral Universality in Regularized Linear Regression With Nearly Deterministic Sensing Matrices","authors":"Rishabh Dudeja;Subhabrata Sen;Yue M. Lu","doi":"10.1109/TIT.2024.3458953","DOIUrl":"10.1109/TIT.2024.3458953","url":null,"abstract":"It has been observed that the performances of many high-dimensional estimation problems are universal with respect to underlying sensing (or design) matrices. Specifically, matrices with markedly different constructions seem to achieve identical performance if they share the same spectral distribution and have “generic” singular vectors. We prove this universality phenomenon for the case of convex regularized least squares (RLS) estimators under a linear regression model with additive Gaussian noise. Our main contributions are two-fold: (1) We introduce a notion of universality classes for sensing matrices, defined through a set of deterministic conditions that fix the spectrum of the sensing matrix and precisely capture the notion of generic singular vectors; (2) We show that for all sensing matrices that lie in the same universality class, the dynamics of the proximal gradient descent algorithm for solving the regression problem, as well as the performance of RLS estimators themselves (under additional strong convexity conditions) are asymptotically identical. In addition to including i.i.d. Gaussian and rotational invariant matrices as special cases, our universality class also contains highly structured, strongly dependent, and even (nearly) deterministic matrices. Examples of the latter include randomly signed versions of incoherent tight frames and randomly subsampled Hadamard transforms. As a consequence of this universality principle, the asymptotic performance of regularized linear regression on many structured matrices constructed with limited randomness can be characterized by using the rotationally invariant ensemble as an equivalent yet mathematically more tractable surrogate.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7923-7951"},"PeriodicalIF":2.2,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimax Optimal Rates with Heavily Imbalanced Binary Data 严重失衡二进制数据的最小最优率
IF 2.5 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1109/tit.2024.3459814
Yang Song, Hui Zou
{"title":"Minimax Optimal Rates with Heavily Imbalanced Binary Data","authors":"Yang Song, Hui Zou","doi":"10.1109/tit.2024.3459814","DOIUrl":"https://doi.org/10.1109/tit.2024.3459814","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"37 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The existence of optimal (v, 4, 1) optical orthogonal codes achieving the Johnson bound 存在实现约翰逊约束的最优 (v, 4, 1) 光学正交码
IF 2.5 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1109/tit.2024.3457802
Chenya Zhao, Yanxun Chang, Tao Feng
{"title":"The existence of optimal (v, 4, 1) optical orthogonal codes achieving the Johnson bound","authors":"Chenya Zhao, Yanxun Chang, Tao Feng","doi":"10.1109/tit.2024.3457802","DOIUrl":"https://doi.org/10.1109/tit.2024.3457802","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"10 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Sieving-Style Information-Set Decoding Algorithm 一种新的筛分式信息集解码算法
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1109/TIT.2024.3457150
Qian Guo;Thomas Johansson;Vu Nguyen
The problem of decoding random codes is a fundamental problem for code-based cryptography, including recent code-based candidates in the NIST post-quantum standardization process. In this paper, we present a novel Sieving-style Information-set Decoding algorithm, addressing the task of solving the syndrome decoding problem. Our approach involves maintaining a list of weight- $2p$ solution vectors to a partial syndrome decoding problem and then creating new vectors by identifying pairs of vectors that collide in p positions. By gradually increasing the parity-check condition by one and repeating this process iteratively, we find the final solution(s). We show that our novel algorithm performs better than other ISDs in the memory-restricted scenario when applied to McEliece. Notably, in the case of problem instances with very low relative weight, the sieving approach uses significantly less memory compared to other ISD algorithms while being competitive in terms of performance.
随机码的解码问题是基于码的密码学的一个基本问题,包括最近在 NIST 后量子标准化过程中出现的基于码的候选问题。在本文中,我们提出了一种新颖的筛分式信息集解码算法,以解决综合征解码问题。我们的方法包括维护一个部分综合征解码问题的权重为 2p$ 的解向量列表,然后通过识别在 p 个位置发生碰撞的向量对来创建新向量。通过将奇偶校验条件逐渐增加一个,并反复重复这一过程,我们就能找到最终的解决方案。我们的研究表明,在内存受限的情况下,我们的新算法在 McEliece 中的表现优于其他 ISD。值得注意的是,与其他 ISD 算法相比,在相对权重很低的问题实例中,筛分方法占用的内存要少得多,同时在性能方面也具有竞争力。
{"title":"A New Sieving-Style Information-Set Decoding Algorithm","authors":"Qian Guo;Thomas Johansson;Vu Nguyen","doi":"10.1109/TIT.2024.3457150","DOIUrl":"10.1109/TIT.2024.3457150","url":null,"abstract":"The problem of decoding random codes is a fundamental problem for code-based cryptography, including recent code-based candidates in the NIST post-quantum standardization process. In this paper, we present a novel Sieving-style Information-set Decoding algorithm, addressing the task of solving the syndrome decoding problem. Our approach involves maintaining a list of weight-\u0000<inline-formula> <tex-math>$2p$ </tex-math></inline-formula>\u0000 solution vectors to a partial syndrome decoding problem and then creating new vectors by identifying pairs of vectors that collide in p positions. By gradually increasing the parity-check condition by one and repeating this process iteratively, we find the final solution(s). We show that our novel algorithm performs better than other ISDs in the memory-restricted scenario when applied to McEliece. Notably, in the case of problem instances with very low relative weight, the sieving approach uses significantly less memory compared to other ISD algorithms while being competitive in terms of performance.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8303-8319"},"PeriodicalIF":2.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust, Secure, and Private Cache-Aided Scalar Linear Function Retrieval From Distributed System With Blind and Adversarial Servers 分布式系统中稳健、安全和私密的缓存辅助标量线性函数检索与盲端和逆端服务器
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1109/TIT.2024.3455557
Qifa Yan;Zhengchun Zhou;Xiaohu Tang
In this work, a distributed server system composed of multiple servers that holds some coded files and multiple users that are interested in retrieving the linear functions of the files is investigated, where the servers are robust, blind and adversarial in the sense that any J servers can together recover all files, while any I colluding servers cannot obtain any information about the files, and at most A servers maliciously provides erroneous information. In addition, the file library must be secure from a wiretapper who obtains all the signals, and the demands of any subset of users must kept private from the other users and servers, even if they collude. A coding scheme is proposed by incorporating the ideas of Shamir’s secret sharing and key superposition into the framework of Placement Delivery Array (PDA), originally proposed to characterize the single-server coded caching system without any security or privacy constraints. It is shown that PDAs associated to Maddah-Ali and Niesen’s coded caching scheme results in an achievable memory-storage-communication region, such that the storage size and communication load were optimal to within a multiplicative gap, except for the small memory regime when the number of files was smaller than the number of users.
在这项工作中,研究了一个由多个服务器组成的分布式服务器系统,这些服务器保存着一些编码文件,多个用户对检索文件的线性函数感兴趣,服务器具有鲁棒性、盲目性和对抗性,即任意 J 个服务器可以共同恢复所有文件,而任意 I 个串通的服务器无法获得文件的任何信息,最多 A 个服务器恶意提供错误信息。此外,文件库必须确保不被窃听者获取所有信号,任何用户子集的需求都必须对其他用户和服务器保密,即使他们串通一气。通过将沙米尔秘密共享和密钥叠加的思想融入放置传送阵列(PDA)框架,提出了一种编码方案,该方案最初是为了描述没有任何安全或隐私限制的单服务器编码缓存系统。研究表明,与 Maddah-Ali 和 Niesen 的编码缓存方案相关联的 PDA 会产生一个可实现的内存-存储-通信区域,从而使存储大小和通信负载在乘法差距内达到最佳状态,但文件数量少于用户数量的小内存系统除外。
{"title":"Robust, Secure, and Private Cache-Aided Scalar Linear Function Retrieval From Distributed System With Blind and Adversarial Servers","authors":"Qifa Yan;Zhengchun Zhou;Xiaohu Tang","doi":"10.1109/TIT.2024.3455557","DOIUrl":"10.1109/TIT.2024.3455557","url":null,"abstract":"In this work, a distributed server system composed of multiple servers that holds some coded files and multiple users that are interested in retrieving the linear functions of the files is investigated, where the servers are robust, blind and adversarial in the sense that any J servers can together recover all files, while any I colluding servers cannot obtain any information about the files, and at most A servers maliciously provides erroneous information. In addition, the file library must be secure from a wiretapper who obtains all the signals, and the demands of any subset of users must kept private from the other users and servers, even if they collude. A coding scheme is proposed by incorporating the ideas of Shamir’s secret sharing and key superposition into the framework of Placement Delivery Array (PDA), originally proposed to characterize the single-server coded caching system without any security or privacy constraints. It is shown that PDAs associated to Maddah-Ali and Niesen’s coded caching scheme results in an achievable memory-storage-communication region, such that the storage size and communication load were optimal to within a multiplicative gap, except for the small memory regime when the number of files was smaller than the number of users.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8237-8250"},"PeriodicalIF":2.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayes-Optimal Estimation in Generalized Linear Models via Spatial Coupling 通过空间耦合实现广义线性模型中的贝叶斯最优估计
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1109/TIT.2024.3455228
Pablo Pascual Cobo;Kuan Hsieh;Ramji Venkataramanan
We consider the problem of signal estimation in a generalized linear model (GLM). GLMs include many canonical problems in statistical estimation, such as linear regression, phase retrieval, and 1-bit compressed sensing. Recent work has precisely characterized the asymptotic minimum mean-squared error (MMSE) for GLMs with i.i.d. Gaussian sensing matrices. However, in many models there is a significant gap between the MMSE and the performance of the best known feasible estimators. We address this issue by considering GLMs defined via spatially coupled sensing matrices. We propose an efficient approximate message passing (AMP) algorithm for estimation and prove that with a simple choice of spatially coupled design, the MSE of a carefully tuned AMP estimator approaches the asymptotic MMSE as the dimensions of the signal and the observation grow proportionally. To prove the result, we first rigorously characterize the asymptotic performance of AMP for a GLM with a generic spatially coupled design. This characterization is in terms of a deterministic recursion (‘state evolution’) that depends on the parameters defining the spatial coupling. Then, using a simple spatially coupled design and a judicious choice of functions for the AMP algorithm, we analyze the fixed points of the resulting state evolution and show that it achieves the asymptotic MMSE. Numerical results for phase retrieval and rectified linear regression show that spatially coupled designs can yield substantially lower MSE than i.i.d. Gaussian designs at finite dimensions when used with AMP algorithms.
我们考虑的是广义线性模型(GLM)中的信号估计问题。广义线性模型包括统计估计中的许多典型问题,如线性回归、相位检索和 1 位压缩传感。最近的工作精确地描述了具有 i.i.d. 高斯传感矩阵的 GLM 的渐近最小均方误差 (MMSE)。然而,在许多模型中,MMSE 与已知最佳可行估计器的性能之间存在很大差距。我们通过考虑通过空间耦合传感矩阵定义的 GLM 来解决这个问题。我们提出了一种用于估计的高效近似信息传递(AMP)算法,并证明了在空间耦合设计的简单选择下,经过仔细调整的 AMP 估计器的 MSE 会随着信号和观测维度的成比例增长而接近渐近 MMSE。为了证明这一结果,我们首先严格描述了具有一般空间耦合设计的 GLM 的 AMP 渐近性能。这种表征是通过确定性递推("状态演化")来实现的,它取决于定义空间耦合的参数。然后,利用一个简单的空间耦合设计和对 AMP 算法函数的明智选择,我们分析了由此产生的状态演化的固定点,并证明它达到了渐近 MMSE。相位检索和整流线性回归的数值结果表明,在有限维度下,空间耦合设计与 AMP 算法配合使用时,其 MSE 值大大低于 i.i.d. 高斯设计。
{"title":"Bayes-Optimal Estimation in Generalized Linear Models via Spatial Coupling","authors":"Pablo Pascual Cobo;Kuan Hsieh;Ramji Venkataramanan","doi":"10.1109/TIT.2024.3455228","DOIUrl":"10.1109/TIT.2024.3455228","url":null,"abstract":"We consider the problem of signal estimation in a generalized linear model (GLM). GLMs include many canonical problems in statistical estimation, such as linear regression, phase retrieval, and 1-bit compressed sensing. Recent work has precisely characterized the asymptotic minimum mean-squared error (MMSE) for GLMs with i.i.d. Gaussian sensing matrices. However, in many models there is a significant gap between the MMSE and the performance of the best known feasible estimators. We address this issue by considering GLMs defined via spatially coupled sensing matrices. We propose an efficient approximate message passing (AMP) algorithm for estimation and prove that with a simple choice of spatially coupled design, the MSE of a carefully tuned AMP estimator approaches the asymptotic MMSE as the dimensions of the signal and the observation grow proportionally. To prove the result, we first rigorously characterize the asymptotic performance of AMP for a GLM with a generic spatially coupled design. This characterization is in terms of a deterministic recursion (‘state evolution’) that depends on the parameters defining the spatial coupling. Then, using a simple spatially coupled design and a judicious choice of functions for the AMP algorithm, we analyze the fixed points of the resulting state evolution and show that it achieves the asymptotic MMSE. Numerical results for phase retrieval and rectified linear regression show that spatially coupled designs can yield substantially lower MSE than i.i.d. Gaussian designs at finite dimensions when used with AMP algorithms.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8343-8363"},"PeriodicalIF":2.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1