首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
TechRxiv: Share Your Preprint Research with the World! techxiv:与世界分享你的预印本研究!
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-22 DOI: 10.1109/TIT.2025.3598529
{"title":"TechRxiv: Share Your Preprint Research with the World!","authors":"","doi":"10.1109/TIT.2025.3598529","DOIUrl":"https://doi.org/10.1109/TIT.2025.3598529","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 9","pages":"7417-7417"},"PeriodicalIF":2.9,"publicationDate":"2025-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11134638","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144891164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Wire Cutting With Classical Communication 最佳线切割与经典通信
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-20 DOI: 10.1109/TIT.2025.3601047
Lukas Brenner;Christophe Piveteau;David Sutter
Circuit knitting is the process of partitioning large quantum circuits into smaller subcircuits such that the result of the original circuits can be deduced by only running the subcircuits. Such techniques will be crucial for near-term and early fault-tolerant quantum computers, as the limited number of qubits is likely to be a major bottleneck for demonstrating quantum advantage. One typically distinguishes between gate cuts and wire cuts when partitioning a circuit. The cost for any circuit knitting approach scales exponentially in the number of cuts. One possibility to realize a cut is via the quasiprobability simulation technique. In fact, we argue that all existing rigorous circuit knitting techniques can be understood in this framework. Furthermore, we characterize the optimal overhead for wire cuts where the subcircuits can exchange classical information or not. We show that the optimal cost for cutting n wires without and with classical communication between the subcircuits scales as $O(16^{n})$ and $O(4^{n})$ , respectively.
电路编织是将大的量子电路划分成更小的子电路的过程,这样原始电路的结果可以通过运行子电路来推断。这些技术对于近期和早期的容错量子计算机至关重要,因为有限的量子比特数量可能是展示量子优势的主要瓶颈。在划分电路时,通常区分门切割和线切割。任何电路编织方法的成本在切割次数上都呈指数级增长。实现切割的一种可能性是通过准概率模拟技术。事实上,我们认为所有现有的严格电路编织技术都可以在这个框架中理解。此外,我们描述了线切割的最佳开销,其中子电路可以交换经典信息或不。我们证明了在子电路之间没有经典通信和具有经典通信的情况下切割n条导线的最佳成本分别为$O(16^{n})$和$O(4^{n})$。
{"title":"Optimal Wire Cutting With Classical Communication","authors":"Lukas Brenner;Christophe Piveteau;David Sutter","doi":"10.1109/TIT.2025.3601047","DOIUrl":"https://doi.org/10.1109/TIT.2025.3601047","url":null,"abstract":"Circuit knitting is the process of partitioning large quantum circuits into smaller subcircuits such that the result of the original circuits can be deduced by only running the subcircuits. Such techniques will be crucial for near-term and early fault-tolerant quantum computers, as the limited number of qubits is likely to be a major bottleneck for demonstrating quantum advantage. One typically distinguishes between gate cuts and wire cuts when partitioning a circuit. The cost for any circuit knitting approach scales exponentially in the number of cuts. One possibility to realize a cut is via the quasiprobability simulation technique. In fact, we argue that all existing rigorous circuit knitting techniques can be understood in this framework. Furthermore, we characterize the optimal overhead for wire cuts where the subcircuits can exchange classical information or not. We show that the optimal cost for cutting <italic>n</i> wires without and with classical communication between the subcircuits scales as <inline-formula> <tex-math>$O(16^{n})$ </tex-math></inline-formula> and <inline-formula> <tex-math>$O(4^{n})$ </tex-math></inline-formula>, respectively.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7742-7752"},"PeriodicalIF":2.9,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduced Complexity Interval Passing for Sparse Signal Recovery 稀疏信号恢复的简化复杂度间隔传递
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1109/TIT.2025.3599674
Salman Habib;Rémi A. Chou;Taejoon Kim
The reconstruction of sparse signals from a limited set of measurements poses a significant challenge as it necessitates a solution to an underdetermined system of linear equations. Compressed sensing (CS) deals with sparse signal reconstruction using techniques such as linear programming (LP) and iterative message passing schemes. The interval passing algorithm (IPA) is an attractive CS approach due to its low complexity when compared to LP. In this paper, we propose a sequential IPA that is inspired by sequential belief propagation decoding of low-density-parity-check (LDPC) codes used for forward error correction in channel coding. In the sequential setting, each check node (CN) in the Tanner graph of an LDPC measurement matrix is scheduled one at a time in every iteration, as opposed to the standard “flooding” interval passing approach in which all CNs are scheduled at once per iteration. The sequential scheme offers a significantly lower message passing complexity compared to flooding IPA on average, and for some measurement matrix and signal sparsity, a complexity reduction of approximately 36% is achieved. We show both analytically and numerically that the reconstruction accuracy of the IPA is not compromised by adopting our sequential scheduling approach.
从一组有限的测量数据中重建稀疏信号是一个重大的挑战,因为它需要求解一个欠定的线性方程组。压缩感知(CS)使用线性规划(LP)和迭代消息传递方案等技术处理稀疏信号重构。区间传递算法(IPA)是一种具有较低复杂度的有吸引力的CS方法。本文提出了一种受低密度奇偶校验(LDPC)码序列信念传播译码启发的序列IPA,用于信道编码中的前向纠错。在顺序设置中,LDPC测量矩阵的Tanner图中的每个检查节点(CN)在每次迭代中一次调度一个,而不是标准的“泛洪”间隔传递方法,在这种方法中,每次迭代一次调度所有的CN。与泛洪IPA相比,顺序方案的平均消息传递复杂度显著降低,对于某些测量矩阵和信号稀疏度,复杂度降低约36%。我们的分析和数值结果表明,采用我们的顺序调度方法不会影响IPA的重建精度。
{"title":"Reduced Complexity Interval Passing for Sparse Signal Recovery","authors":"Salman Habib;Rémi A. Chou;Taejoon Kim","doi":"10.1109/TIT.2025.3599674","DOIUrl":"https://doi.org/10.1109/TIT.2025.3599674","url":null,"abstract":"The reconstruction of sparse signals from a limited set of measurements poses a significant challenge as it necessitates a solution to an underdetermined system of linear equations. Compressed sensing (CS) deals with sparse signal reconstruction using techniques such as linear programming (LP) and iterative message passing schemes. The interval passing algorithm (IPA) is an attractive CS approach due to its low complexity when compared to LP. In this paper, we propose a sequential IPA that is inspired by sequential belief propagation decoding of low-density-parity-check (LDPC) codes used for forward error correction in channel coding. In the sequential setting, each check node (CN) in the Tanner graph of an LDPC measurement matrix is scheduled one at a time in every iteration, as opposed to the standard “flooding” interval passing approach in which all CNs are scheduled at once per iteration. The sequential scheme offers a significantly lower message passing complexity compared to flooding IPA on average, and for some measurement matrix and signal sparsity, a complexity reduction of approximately 36% is achieved. We show both analytically and numerically that the reconstruction accuracy of the IPA is not compromised by adopting our sequential scheduling approach.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"8080-8098"},"PeriodicalIF":2.9,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several New Classes of Self-Orthogonal Minimal Linear Codes Violating the Ashikhmin–Barg Condition 违反Ashikhmin-Barg条件的几类新的自正交极小线性码
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1109/TIT.2025.3600002
Wengang Jin;Kangquan Li;Longjiang Qu
Linear codes have attracted considerable attention in coding theory and cryptography due to their significant applications in secret sharing schemes, secure two-party computation, and Galois geometries, among others. As two special subclasses of linear codes, minimal linear codes and self-orthogonal linear codes are of particular interest. Constructing linear codes that possess both minimality and self-orthogonality is very interesting. The main purpose of this paper is to construct self-orthogonal minimal linear codes that violate the Ashikhmin-Barg (AB for short) condition over the finite field $mathbb {F}_{p}$ . First, we present several classes of self-orthogonal minimal linear codes violating the AB condition over the finite field $mathbb {F}_{2}$ and determine their weight distributions. Next, for any odd prime p, we construct two classes of self-orthogonal linear codes from p-ary functions, which contain some optimal or almost optimal codes. Finally, based on plateaued functions, we construct two classes of self-orthogonal linear codes that violate the AB condition. Their weight distributions are also provided. To the best of our knowledge, this paper is the first to investigate the constructions of linear codes that violate the AB condition and satisfy self-orthogonality.
线性码由于其在秘密共享方案、安全两方计算和伽罗瓦几何等方面的重要应用,在编码理论和密码学中引起了相当大的关注。极小线性码和自正交线性码作为线性码的两个特殊子类,引起了人们的广泛关注。构造既具有极小性又具有自正交性的线性码是非常有趣的。本文的主要目的是构造有限域$mathbb {F}_{p}$上违反Ashikhmin-Barg(简称AB)条件的自正交最小线性码。首先,我们在有限域$mathbb {F}_{2}$上给出了违反AB条件的几类自正交最小线性码,并确定了它们的权值分布。其次,对于任意奇素数p,我们用p元函数构造两类自正交线性码,它们包含一些最优或几乎最优码。最后,基于稳定函数,构造了两类违背AB条件的自正交线性码。还提供了它们的权重分布。据我们所知,本文首次研究了违反AB条件且满足自正交的线性码的构造。
{"title":"Several New Classes of Self-Orthogonal Minimal Linear Codes Violating the Ashikhmin–Barg Condition","authors":"Wengang Jin;Kangquan Li;Longjiang Qu","doi":"10.1109/TIT.2025.3600002","DOIUrl":"https://doi.org/10.1109/TIT.2025.3600002","url":null,"abstract":"Linear codes have attracted considerable attention in coding theory and cryptography due to their significant applications in secret sharing schemes, secure two-party computation, and Galois geometries, among others. As two special subclasses of linear codes, minimal linear codes and self-orthogonal linear codes are of particular interest. Constructing linear codes that possess both minimality and self-orthogonality is very interesting. The main purpose of this paper is to construct self-orthogonal minimal linear codes that violate the Ashikhmin-Barg (AB for short) condition over the finite field <inline-formula> <tex-math>$mathbb {F}_{p}$ </tex-math></inline-formula>. First, we present several classes of self-orthogonal minimal linear codes violating the AB condition over the finite field <inline-formula> <tex-math>$mathbb {F}_{2}$ </tex-math></inline-formula> and determine their weight distributions. Next, for any odd prime <italic>p</i>, we construct two classes of self-orthogonal linear codes from <italic>p</i>-ary functions, which contain some optimal or almost optimal codes. Finally, based on plateaued functions, we construct two classes of self-orthogonal linear codes that violate the AB condition. Their weight distributions are also provided. To the best of our knowledge, this paper is the first to investigate the constructions of linear codes that violate the AB condition and satisfy self-orthogonality.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7699-7714"},"PeriodicalIF":2.9,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subspace and DOA Estimation Under Coarse Quantization 粗量化下的子空间与DOA估计
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-13 DOI: 10.1109/TIT.2025.3598702
Sjoerd Dirksen;Weilin Li;Johannes Maly
We study direction-of-arrival (DOA) estimation from coarsely quantized data. We focus on a two-step approach which first estimates the signal subspace via covariance estimation and then extracts DOA angles by the ESPRIT algorithm. In particular, we analyze two stochastic quantization schemes which use dithering: a one-bit quantizer combined with rectangular dither and a multi-bit quantizer with triangular dither. For each quantizer, we derive rigorous high probability bounds for the distances between the true and estimated signal subspaces and DOA angles. Using our analysis, we identify scenarios in which subspace and DOA estimation via triangular dithering qualitatively outperforms rectangular dithering. We verify in numerical simulations that our estimates are optimal in their dependence on the smallest non-zero eigenvalue of the target matrix. The resulting subspace estimation guarantees are equally applicable in the analysis of other spectral estimation algorithms and related problems.
我们研究了粗量化数据的到达方向估计。本文重点研究了一种两步法,首先通过协方差估计估计信号子空间,然后通过ESPRIT算法提取DOA角。特别地,我们分析了两种使用抖动的随机量化方案:结合矩形抖动的一比特量化方案和结合三角形抖动的多比特量化方案。对于每个量化器,我们推导出真实和估计信号子空间之间的距离和DOA角之间的严格的高概率界限。通过我们的分析,我们确定了通过三角形抖动进行子空间和DOA估计在质量上优于矩形抖动的场景。我们在数值模拟中验证了我们的估计是最优的,因为它们依赖于目标矩阵的最小非零特征值。所得子空间估计保证同样适用于其他谱估计算法及相关问题的分析。
{"title":"Subspace and DOA Estimation Under Coarse Quantization","authors":"Sjoerd Dirksen;Weilin Li;Johannes Maly","doi":"10.1109/TIT.2025.3598702","DOIUrl":"https://doi.org/10.1109/TIT.2025.3598702","url":null,"abstract":"We study direction-of-arrival (DOA) estimation from coarsely quantized data. We focus on a two-step approach which first estimates the signal subspace via covariance estimation and then extracts DOA angles by the ESPRIT algorithm. In particular, we analyze two stochastic quantization schemes which use dithering: a one-bit quantizer combined with rectangular dither and a multi-bit quantizer with triangular dither. For each quantizer, we derive rigorous high probability bounds for the distances between the true and estimated signal subspaces and DOA angles. Using our analysis, we identify scenarios in which subspace and DOA estimation via triangular dithering qualitatively outperforms rectangular dithering. We verify in numerical simulations that our estimates are optimal in their dependence on the smallest non-zero eigenvalue of the target matrix. The resulting subspace estimation guarantees are equally applicable in the analysis of other spectral estimation algorithms and related problems.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"8149-8168"},"PeriodicalIF":2.9,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sample-Efficient Reinforcement Learning From Human Feedback via Information-Directed Sampling 基于信息导向采样的人类反馈样本高效强化学习
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-13 DOI: 10.1109/TIT.2025.3598296
Han Qi;Haochen Yang;Qiaosheng Zhang;Zhuoran Yang
We study the problem of reinforcement learning from human feedback (RLHF), a critical problem in training large language models, from a theoretical perspective. Our main contribution is the design of novel sample-efficient RLHF algorithms based on information-directed sampling (IDS), an online decision-making principle inspired by information theory. Our algorithms maximize the sum of the value function and a mutual information term that encourages exploration of the unknown environment (which quantifies the information gained about the environment through observed human feedback data). To tackle the challenge of large state spaces and improve sample efficiency, we construct a simplified surrogate environment and introduce a novel distance measure (named the $ell _{g}$ -distance), enabling our IDS-based algorithm to achieve a Bayesian regret upper bound of order $O(H^{3/2}sqrt {log (K(epsilon)) T})$ , where H is the episode length, T is the number of episode and $K(epsilon)$ is related to the covering number of the environment. Specializing to the tabular settings, this regret bound is of order $tilde {O}(H^{2}sqrt {SAT})$ , where S and A are the numbers of states and actions. Finally, we propose an Approximate-IDS algorithm that is computationally more efficient while maintaining nearly the same sample efficiency. The design principle of this approximate algorithm is not only effective in RLHF settings but also applicable to the standard RL framework. Moreover, our work showcases the value of information theory in reinforcement learning and in the training of large language models.
本文从理论角度研究了基于人类反馈的强化学习(RLHF)问题,这是训练大型语言模型的一个关键问题。我们的主要贡献是基于信息导向采样(IDS)的新型样本高效RLHF算法,这是一种受信息论启发的在线决策原则。我们的算法最大化了价值函数和相互信息项的总和,鼓励对未知环境的探索(通过观察到的人类反馈数据量化获得的关于环境的信息)。为了解决大状态空间的挑战并提高样本效率,我们构建了一个简化的代理环境,并引入了一种新的距离度量(命名为$ell _{g}$ -distance),使我们基于ids的算法能够实现阶数$O(H^{3/2}sqrt {log (K(epsilon)) T})$的贝叶斯遗憾上界,其中H为集长,T为集数,$K(epsilon)$与环境的覆盖数有关。专门针对表格设置,此遗憾绑定的顺序为$tilde {O}(H^{2}sqrt {SAT})$,其中S和A是状态和操作的数量。最后,我们提出了一种近似ids算法,该算法在保持几乎相同的样本效率的同时计算效率更高。该近似算法的设计原理不仅适用于RLHF设置,而且适用于标准RL框架。此外,我们的工作展示了信息理论在强化学习和大型语言模型训练中的价值。
{"title":"Sample-Efficient Reinforcement Learning From Human Feedback via Information-Directed Sampling","authors":"Han Qi;Haochen Yang;Qiaosheng Zhang;Zhuoran Yang","doi":"10.1109/TIT.2025.3598296","DOIUrl":"https://doi.org/10.1109/TIT.2025.3598296","url":null,"abstract":"We study the problem of reinforcement learning from human feedback (RLHF), a critical problem in training large language models, from a theoretical perspective. Our main contribution is the design of novel sample-efficient RLHF algorithms based on information-directed sampling (IDS), an online decision-making principle inspired by information theory. Our algorithms maximize the sum of the value function and a mutual information term that encourages exploration of the unknown environment (which quantifies the information gained about the environment through observed human feedback data). To tackle the challenge of large state spaces and improve sample efficiency, we construct a simplified <italic>surrogate environment</i> and introduce a novel distance measure (named the <inline-formula> <tex-math>$ell _{g}$ </tex-math></inline-formula><italic>-distance</i>), enabling our IDS-based algorithm to achieve a Bayesian regret upper bound of order <inline-formula> <tex-math>$O(H^{3/2}sqrt {log (K(epsilon)) T})$ </tex-math></inline-formula>, where <italic>H</i> is the episode length, <italic>T</i> is the number of episode and <inline-formula> <tex-math>$K(epsilon)$ </tex-math></inline-formula> is related to the covering number of the environment. Specializing to the tabular settings, this regret bound is of order <inline-formula> <tex-math>$tilde {O}(H^{2}sqrt {SAT})$ </tex-math></inline-formula>, where <italic>S</i> and <italic>A</i> are the numbers of states and actions. Finally, we propose an Approximate-IDS algorithm that is computationally more efficient while maintaining nearly the same sample efficiency. The design principle of this approximate algorithm is not only effective in RLHF settings but also applicable to the standard RL framework. Moreover, our work showcases the value of information theory in reinforcement learning and in the training of large language models.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7942-7958"},"PeriodicalIF":2.9,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bregman-Divergence-Based Arimoto-Blahut Algorithm 基于bregman - divergence的Arimoto-Blahut算法
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-12 DOI: 10.1109/TIT.2025.3597943
Masahito Hayashi
We generalize the generalized Arimoto-Blahut algorithm to a general function defined over Bregman-divergence system. In existing methods, when linear constraints are imposed, each iteration needs to solve a convex minimization. Exploiting our obtained algorithm, we propose a minimization-free-iteration algorithm. This algorithm can be applied to classical and quantum rate-distortion theory. We numerically apply our method to the derivation of the optimal conditional distribution in the rate-distortion theory.
我们将广义的Arimoto-Blahut算法推广到定义在Bregman-divergence系统上的一般函数。在现有的方法中,当施加线性约束时,每次迭代需要解决一个凸最小化问题。利用我们得到的算法,我们提出了一种无最小化迭代算法。该算法可应用于经典和量子速率畸变理论。将该方法应用于率失真理论中最优条件分布的推导。
{"title":"Bregman-Divergence-Based Arimoto-Blahut Algorithm","authors":"Masahito Hayashi","doi":"10.1109/TIT.2025.3597943","DOIUrl":"https://doi.org/10.1109/TIT.2025.3597943","url":null,"abstract":"We generalize the generalized Arimoto-Blahut algorithm to a general function defined over Bregman-divergence system. In existing methods, when linear constraints are imposed, each iteration needs to solve a convex minimization. Exploiting our obtained algorithm, we propose a minimization-free-iteration algorithm. This algorithm can be applied to classical and quantum rate-distortion theory. We numerically apply our method to the derivation of the optimal conditional distribution in the rate-distortion theory.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7788-7801"},"PeriodicalIF":2.9,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Non-Interactive Simulation of Distributed Sources With Finite Alphabets 有限字母分布源的非交互仿真
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-11 DOI: 10.1109/TIT.2025.3597546
Hojat Allah Salehi;Farhad Shirani
This work presents a Fourier analysis framework for the non-interactive source simulation (NISS) problem. Two distributed agents observe a pair of sequences $X^{d}$ and $Y^{d}$ drawn according to a joint distribution $P_{X^{d}Y^{d}}$ . The agents aim to generate outputs $U=f_{d}(X^{d})$ and $V=g_{d}(Y^{d})$ with a joint distribution sufficiently close in total variation to a target distribution $Q_{UV}$ . Existing works have shown that the NISS problem with finite-alphabet outputs is decidable. For the binary-output NISS, an upper-bound to the input complexity was derived which is $Oleft ({{exp mathrm {poly}left ({{frac {1}{epsilon }}}right)}}right)$ . In this work, the input complexity and algorithm design are addressed in several classes of NISS scenarios. For binary-output NISS scenarios with doubly-symmetric binary inputs, it is shown that the input complexity is $Theta left ({{log {frac {1}{epsilon }}}}right)$ , thus providing a super-exponential improvement in input complexity. An explicit characterization of the simulating pair of functions is provided. For general finite-input scenarios, a constructive algorithm is introduced that explicitly finds the simulating functions $(f_{d}(X^{d}),g_{d}(Y^{d}))$ . The approach relies on a novel Fourier analysis framework. Various numerical simulations of NISS scenarios with IID inputs are provided. Furthermore, to illustrate the general applicability of the Fourier framework, several examples with non-IID inputs, including entanglement-assisted NISS and NISS with Markovian inputs are provided.
这项工作提出了非交互源模拟(NISS)问题的傅里叶分析框架。两个分布式代理观察根据联合分布$P_{X^{d}Y^{d}}$绘制的一对序列$X^{d}$和$Y^{d}$。智能体的目标是生成输出$U=f_{d}(X^{d})$和$V=g_{d}(Y^{d})$,其联合分布的总变化量与目标分布$Q_{UV}$足够接近。现有的研究表明,具有有限字母输出的NISS问题是可确定的。对于二进制输出的NISS,导出了输入复杂度的上限为$Oleft ({{exp mathrm {poly}left ({{frac {1}{epsilon }}}right)}}right)$。在这项工作中,输入复杂性和算法设计在几种NISS场景中得到解决。对于具有双对称二进制输入的二元输出NISS场景,表明输入复杂度为$Theta left ({{log {frac {1}{epsilon }}}}right)$,从而提供了输入复杂度的超指数改进。给出了模拟函数对的显式表征。对于一般有限输入场景,引入了一种显式查找模拟函数$(f_{d}(X^{d}),g_{d}(Y^{d}))$的构造算法。该方法依赖于一种新颖的傅立叶分析框架。提供了具有IID输入的NISS场景的各种数值模拟。此外,为了说明傅里叶框架的一般适用性,提供了几个具有非iid输入的示例,包括纠缠辅助NISS和具有马尔可夫输入的NISS。
{"title":"On Non-Interactive Simulation of Distributed Sources With Finite Alphabets","authors":"Hojat Allah Salehi;Farhad Shirani","doi":"10.1109/TIT.2025.3597546","DOIUrl":"https://doi.org/10.1109/TIT.2025.3597546","url":null,"abstract":"This work presents a Fourier analysis framework for the non-interactive source simulation (NISS) problem. Two distributed agents observe a pair of sequences <inline-formula> <tex-math>$X^{d}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$Y^{d}$ </tex-math></inline-formula> drawn according to a joint distribution <inline-formula> <tex-math>$P_{X^{d}Y^{d}}$ </tex-math></inline-formula>. The agents aim to generate outputs <inline-formula> <tex-math>$U=f_{d}(X^{d})$ </tex-math></inline-formula> and <inline-formula> <tex-math>$V=g_{d}(Y^{d})$ </tex-math></inline-formula> with a joint distribution sufficiently close in total variation to a target distribution <inline-formula> <tex-math>$Q_{UV}$ </tex-math></inline-formula>. Existing works have shown that the NISS problem with finite-alphabet outputs is decidable. For the binary-output NISS, an upper-bound to the input complexity was derived which is <inline-formula> <tex-math>$Oleft ({{exp mathrm {poly}left ({{frac {1}{epsilon }}}right)}}right)$ </tex-math></inline-formula>. In this work, the input complexity and algorithm design are addressed in several classes of NISS scenarios. For binary-output NISS scenarios with doubly-symmetric binary inputs, it is shown that the input complexity is <inline-formula> <tex-math>$Theta left ({{log {frac {1}{epsilon }}}}right)$ </tex-math></inline-formula>, thus providing a super-exponential improvement in input complexity. An explicit characterization of the simulating pair of functions is provided. For general finite-input scenarios, a constructive algorithm is introduced that explicitly finds the simulating functions <inline-formula> <tex-math>$(f_{d}(X^{d}),g_{d}(Y^{d}))$ </tex-math></inline-formula>. The approach relies on a novel Fourier analysis framework. Various numerical simulations of NISS scenarios with IID inputs are provided. Furthermore, to illustrate the general applicability of the Fourier framework, several examples with non-IID inputs, including entanglement-assisted NISS and NISS with Markovian inputs are provided.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"8048-8079"},"PeriodicalIF":2.9,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Properties of Algorithmic Information Distance 算法信息距离的性质
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-08 DOI: 10.1109/TIT.2025.3597092
Marcus Hutter
The domain-independent universal Normalized Information Distance based on Kolmogorov complexity has been (in approximate form) successfully applied to a variety of difficult clustering problems. In this paper we investigate theoretical properties of the un-normalized algorithmic information distance $d_{K}$ . The main question we are asking in this work is what properties this curious distance has, besides being a metric. We show that many (in)finite-dimensional spaces can(not) be isometrically scale-embedded into the space of finite strings with metric $d_{K}$ . We also show that $d_{K}$ is not an Euclidean distance, but any finite set of points in Euclidean space can be scale-embedded into $({0,1}^{*},d_{K})$ . A major contribution is the development of the necessary framework and tools for finding more (interesting) properties of $d_{K}$ in future, and to state several open problems.
基于Kolmogorov复杂度的域无关的通用归一化信息距离已经(以近似形式)成功地应用于各种困难的聚类问题。本文研究了非归一化信息距离算法$d_{K}$的理论性质。在这项工作中,我们要问的主要问题是这个奇怪的距离除了是一个度规之外,还有什么性质。我们证明了许多有限维空间可以(不)等距尺度嵌入到度量为$d_{K}$的有限字符串空间中。我们还证明了$d_{K}$不是欧几里得距离,但欧几里得空间中的任何有限点集都可以尺度嵌入到$({0,1}^{*},d_{K})$中。一个主要的贡献是开发了必要的框架和工具,以便在将来发现更多(有趣的)$d_{K}$的属性,并说明几个开放的问题。
{"title":"Properties of Algorithmic Information Distance","authors":"Marcus Hutter","doi":"10.1109/TIT.2025.3597092","DOIUrl":"https://doi.org/10.1109/TIT.2025.3597092","url":null,"abstract":"The domain-independent universal Normalized Information Distance based on Kolmogorov complexity has been (in approximate form) successfully applied to a variety of difficult clustering problems. In this paper we investigate theoretical properties of the un-normalized algorithmic information distance <inline-formula> <tex-math>$d_{K}$ </tex-math></inline-formula>. The main question we are asking in this work is what properties this curious distance has, besides being a metric. We show that many (in)finite-dimensional spaces can(not) be isometrically scale-embedded into the space of finite strings with metric <inline-formula> <tex-math>$d_{K}$ </tex-math></inline-formula>. We also show that <inline-formula> <tex-math>$d_{K}$ </tex-math></inline-formula> is not an Euclidean distance, but any finite set of points in Euclidean space can be scale-embedded into <inline-formula> <tex-math>$({0,1}^{*},d_{K})$ </tex-math></inline-formula>. A major contribution is the development of the necessary framework and tools for finding more (interesting) properties of <inline-formula> <tex-math>$d_{K}$ </tex-math></inline-formula> in future, and to state several open problems.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"7540-7554"},"PeriodicalIF":2.9,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Functions of Low Differential Uniformity in Characteristic 2: A New Approach (I) 特性2低差分均匀性函数分析:一种新方法(一)
IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-08 DOI: 10.1109/TIT.2025.3597162
Nurdagül Anbar;Tekgül Kalaycı;Alev Topuzoğlu
We introduce a new concept, the APN-defect, which can be thought of as measuring the distance of a given function $G:mathbb {F}_{2^{n}} rightarrow mathbb {F}_{2^{n}}$ to the set of almost perfect nonlinear (APN) functions. This concept is motivated by the detailed analysis of the differential behaviour of non-APN functions (of low differential uniformity) G using the so-called difference squares. Indeed, the insight into some structural qualities of S-boxes provided by this new approach is particularly useful in the light of recent refinements of differential cryptanalysis. We describe the relations between the APN-defect and other current concepts of similar nature. Values of APN-defect for several classes of functions of interest, including Dembowski-Ostrom polynomials are given. This enables one to identify the quasi-APN ones, i.e., those with favourable differential behavior. The difference square corresponding to a modification of the inverse function is determined, its APN-defect depending on n is evaluated, the partial quadruple system associated to it is described, and the implications are discussed. In the forthcoming second part of this work we further examine the APN-defect of modifications of the inverse function and address some questions concerning CCZ-equivalence. We also study modifications of classes of functions of low differential uniformity over infinitely many extensions of $mathbb {F}_{2^{n}}$ and present quantitative results on their differential behaviour.
我们引入了一个新的概念,APN缺陷,它可以被认为是测量给定函数$G:mathbb {F}_{2^{n}} 右行mathbb {F}_{2^{n}}$到几乎完全非线性(APN)函数集的距离。这个概念是由使用所谓的差分平方对非apn函数(低差分均匀性)G的微分行为的详细分析所激发的。事实上,这种新方法提供的对s盒的一些结构特性的洞察,在差分密码分析的最新改进中特别有用。我们描述了apn缺陷与当前其他类似性质的概念之间的关系。给出了几种感兴趣的函数,包括Dembowski-Ostrom多项式的apn缺陷值。这使人们能够识别准apn,即具有有利微分行为的那些。确定了逆函数修正所对应的差分平方,评估了其随n的apn缺陷,描述了与之相关的部分四重系统,并讨论了其含义。在接下来的第二部分中,我们进一步研究了反函数修正的apn缺陷,并解决了一些关于ccz等价的问题。我们还研究了$mathbb {F}_{2}}}$无穷多个扩展上的低微分均匀性函数类的修正,并给出了它们的微分行为的定量结果。
{"title":"Analysis of Functions of Low Differential Uniformity in Characteristic 2: A New Approach (I)","authors":"Nurdagül Anbar;Tekgül Kalaycı;Alev Topuzoğlu","doi":"10.1109/TIT.2025.3597162","DOIUrl":"https://doi.org/10.1109/TIT.2025.3597162","url":null,"abstract":"We introduce a new concept, the <italic>APN-defect</i>, which can be thought of as measuring the distance of a given function <inline-formula> <tex-math>$G:mathbb {F}_{2^{n}} rightarrow mathbb {F}_{2^{n}}$ </tex-math></inline-formula> to the set of almost perfect nonlinear (APN) functions. This concept is motivated by the detailed analysis of the differential behaviour of non-APN functions (of low differential uniformity) <italic>G</i> using the so-called <italic>difference squares</i>. Indeed, the insight into some structural qualities of S-boxes provided by this new approach is particularly useful in the light of recent refinements of differential cryptanalysis. We describe the relations between the APN-defect and other current concepts of similar nature. Values of APN-defect for several classes of functions of interest, including Dembowski-Ostrom polynomials are given. This enables one to identify the <italic>quasi-APN</i> ones, i.e., those with favourable differential behavior. The difference square corresponding to a modification of the inverse function is determined, its APN-defect depending on <italic>n</i> is evaluated, the partial quadruple system associated to it is described, and the implications are discussed. In the forthcoming second part of this work we further examine the APN-defect of modifications of the inverse function and address some questions concerning CCZ-equivalence. We also study modifications of classes of functions of low differential uniformity over infinitely many extensions of <inline-formula> <tex-math>$mathbb {F}_{2^{n}}$ </tex-math></inline-formula> and present quantitative results on their differential behaviour.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 10","pages":"8002-8016"},"PeriodicalIF":2.9,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145110319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1