首页 > 最新文献

2016 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
An achievable rate region for superposed timing channels 叠加时序信道的可实现速率区域
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541322
G. Ferrante, Tony Q. S. Quek, M. Win
A multiple-access channel where point processes are randomly transformed by timing channels and then superposed is considered. An achievable rate region for the K-user channel is established. A single-user achievable rate in the presence of “many” interfering users is proposed. Results are applied to exponential server timing channels.
考虑了一种多址信道,其中点进程由定时信道随机变换,然后叠加。建立了k用户信道的可实现速率区域。提出了存在“许多”干扰用户时的单用户可实现速率。结果应用于指数服务器时序信道。
{"title":"An achievable rate region for superposed timing channels","authors":"G. Ferrante, Tony Q. S. Quek, M. Win","doi":"10.1109/ISIT.2016.7541322","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541322","url":null,"abstract":"A multiple-access channel where point processes are randomly transformed by timing channels and then superposed is considered. An achievable rate region for the K-user channel is established. A single-user achievable rate in the presence of “many” interfering users is proposed. Results are applied to exponential server timing channels.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stopping sets for MDS-based product codes 基于mds的产品代码停止集
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541597
Fanny Jardel, J. Boutros, M. Sarkiss
Stopping sets for MDS-based product codes under iterative row-column algebraic decoding are analyzed in this paper. A union bound to the performance of iterative decoding is established for the independent symbol erasure channel. This bound is tight at low and very low error rates. We also proved that the performance of iterative decoding reaches the performance of Maximum-Likelihood decoding at vanishing channel erasure probability. Numerical results are shown for product codes at different coding rates.
本文分析了迭代行列代数译码下基于mds的产品编码的停止集。针对独立的符号擦除信道,建立了迭代译码性能的联合约束。在低错误率和非常低的错误率下,这个界限是紧密的。我们还证明了迭代译码的性能在信道擦除概率消失时达到最大似然译码的性能。给出了不同编码速率下产品编码的数值结果。
{"title":"Stopping sets for MDS-based product codes","authors":"Fanny Jardel, J. Boutros, M. Sarkiss","doi":"10.1109/ISIT.2016.7541597","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541597","url":null,"abstract":"Stopping sets for MDS-based product codes under iterative row-column algebraic decoding are analyzed in this paper. A union bound to the performance of iterative decoding is established for the independent symbol erasure channel. This bound is tight at low and very low error rates. We also proved that the performance of iterative decoding reaches the performance of Maximum-Likelihood decoding at vanishing channel erasure probability. Numerical results are shown for product codes at different coding rates.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A polynomial-time algorithm for pliable index coding 柔性索引编码的多项式时间算法
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541273
Linqi Song, C. Fragouli
Pliable index coding considers a server with m messages and n clients where each client has as side information a subset of the messages. We seek to minimize the number of transmissions the server should make, so that each client receives (any) one message she does not already have. Previous work has shown that the server can achieve this using at most O(log2(n)) transmissions and needs at least Ω(log(n)) transmissions in the worst case, but finding a code of optimal length is NP-hard. In this paper, we design a polynomial-time algorithm that uses less than O(log2(n)) transmissions, i.e., almost worst-case optimal. We also establish a connection between the pliable index coding problem and the minrank problem over a family of mixed matrices.
柔性索引编码考虑一个具有m条消息和n个客户端的服务器,其中每个客户端具有消息的一个子集作为副信息。我们力求使服务器应该进行的传输数量最小化,以便每个客户端接收(任何)一条她还没有的消息。以前的工作表明,服务器最多可以使用O(log2(n))传输来实现这一点,在最坏的情况下至少需要Ω(log(n))传输,但是找到最佳长度的代码是np困难的。在本文中,我们设计了一个多项式时间算法,使用少于O(log2(n))传输,即几乎最坏情况最优。我们还建立了一类混合矩阵上的柔性索引编码问题与minrank问题之间的联系。
{"title":"A polynomial-time algorithm for pliable index coding","authors":"Linqi Song, C. Fragouli","doi":"10.1109/ISIT.2016.7541273","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541273","url":null,"abstract":"Pliable index coding considers a server with m messages and n clients where each client has as side information a subset of the messages. We seek to minimize the number of transmissions the server should make, so that each client receives (any) one message she does not already have. Previous work has shown that the server can achieve this using at most O(log2(n)) transmissions and needs at least Ω(log(n)) transmissions in the worst case, but finding a code of optimal length is NP-hard. In this paper, we design a polynomial-time algorithm that uses less than O(log2(n)) transmissions, i.e., almost worst-case optimal. We also establish a connection between the pliable index coding problem and the minrank problem over a family of mixed matrices.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Capacity of two-relay diamond networks with rate-limited links to the relays and a binary adder multiple access channel 具有速率限制链路到中继和二进制加法器多址通道的双中继菱形网络的容量
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541582
S. S. Bidokhti, G. Kramer
A class of two-relay diamond networks is studied where the broadcast component is modelled by two independent bit-pipes and the multiple-access component is memoryless. A new upper is derived on the capacity which generalizes bounding techniques of Ozarow for the Gaussian multiple description problem (1981) and Kang and Liu for the Gaussian diamond network (2011). For binary adder MACs, the upper bound establishes the capacity for all ranges of bit-pipe capacities.
研究了一类双中继菱形网络,其中广播部分由两个独立的位管道建模,多址部分是无存储器的。对Ozarow的高斯多重描述问题(1981)和Kang和Liu的高斯菱形网络(2011)的边界技术进行了推广,导出了一种新的上限容量。对于二进制加法器mac,上界确定了所有位管容量范围的容量。
{"title":"Capacity of two-relay diamond networks with rate-limited links to the relays and a binary adder multiple access channel","authors":"S. S. Bidokhti, G. Kramer","doi":"10.1109/ISIT.2016.7541582","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541582","url":null,"abstract":"A class of two-relay diamond networks is studied where the broadcast component is modelled by two independent bit-pipes and the multiple-access component is memoryless. A new upper is derived on the capacity which generalizes bounding techniques of Ozarow for the Gaussian multiple description problem (1981) and Kang and Liu for the Gaussian diamond network (2011). For binary adder MACs, the upper bound establishes the capacity for all ranges of bit-pipe capacities.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Continuity and robustness to incorrect priors in estimation and control 在估计和控制中对错误先验的连续性和鲁棒性
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541649
G. Baker, S. Yüksel
This paper studies continuity properties of single and multi stage estimation and stochastic control problems with respect to initial probability distributions and applications of these results to the study of robustness of control policies applied to systems with incomplete probabilistic models. We establish that continuity and robustness cannot be guaranteed under weak and setwise convergences, but the optimal cost is continuous under the more stringent topology of total variation for stage-wise cost functions that are nonnegative, measurable, and bounded. Under further conditions on either the measurement channels or the source processes, however, weak convergence is sufficient. We also discuss similar properties under the Wasserstein distance. These results are shown to have direct implications, positive or negative, for robust control: If an optimal control policy is applied to a prior model P̃, and if P̃ is close to the true model P, then the application of the incorrect optimal policy to the true model leads to a loss that is continuous in the distance between P̃ and P under total variation, and under some setups, weak convergence distance measures.
本文研究了初始概率分布下单阶段和多阶段估计和随机控制问题的连续性,并将这些结果应用于不完全概率模型系统控制策略的鲁棒性研究。对于非负的、可测量的、有界的阶段代价函数,我们建立了在弱收敛和集收敛条件下,连续性和鲁棒性不能保证,但在更严格的全变分拓扑下,最优代价是连续的。然而,在测量通道或源过程的进一步条件下,弱收敛性是足够的。我们还讨论了Wasserstein距离下的类似性质。这些结果被证明对鲁棒控制有直接的影响,无论是正面的还是负面的:如果将最优控制策略应用于先验模型P /,并且如果P /接近真实模型P /,那么将不正确的最优策略应用于真实模型会导致在总变化下,在P /和P之间的距离上连续的损失,并且在某些设置下,弱收敛距离度量。
{"title":"Continuity and robustness to incorrect priors in estimation and control","authors":"G. Baker, S. Yüksel","doi":"10.1109/ISIT.2016.7541649","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541649","url":null,"abstract":"This paper studies continuity properties of single and multi stage estimation and stochastic control problems with respect to initial probability distributions and applications of these results to the study of robustness of control policies applied to systems with incomplete probabilistic models. We establish that continuity and robustness cannot be guaranteed under weak and setwise convergences, but the optimal cost is continuous under the more stringent topology of total variation for stage-wise cost functions that are nonnegative, measurable, and bounded. Under further conditions on either the measurement channels or the source processes, however, weak convergence is sufficient. We also discuss similar properties under the Wasserstein distance. These results are shown to have direct implications, positive or negative, for robust control: If an optimal control policy is applied to a prior model P̃, and if P̃ is close to the true model P, then the application of the incorrect optimal policy to the true model leads to a loss that is continuous in the distance between P̃ and P under total variation, and under some setups, weak convergence distance measures.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed detection over connected networks via one-bit quantizer 通过一比特量化器在连接网络上进行分布式检测
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541554
Shengyu Zhu, Biao Chen
This paper considers distributed detection over large scale connected networks with arbitrary topology. Contrasting to the canonical parallel fusion network where a single node has access to the outputs from all other sensors, each node can only exchange one-bit information with its direct neighbors in the present setting. Our approach adopts a novel consensus reaching algorithm using asymmetric bounded quantizers that allow controllable consensus error. Under the Neyman-Pearson criterion, we show that, with each sensor employing an identical one-bit quantizer for local information exchange, this approach achieves the optimal error exponent of centralized detection provided that the algorithm converges. Simulations show that the algorithm converges when the network is large enough.
本文研究了具有任意拓扑结构的大规模连接网络的分布式检测问题。典型的并行融合网络中,单个节点可以访问所有其他传感器的输出,而在当前的设置中,每个节点只能与其直接相邻节点交换1位信息。我们的方法采用了一种新的共识达成算法,该算法使用非对称有界量化器,允许共识误差可控。在Neyman-Pearson准则下,我们证明了当每个传感器使用相同的1位量化器进行本地信息交换时,该方法在算法收敛的前提下获得了集中检测的最佳误差指数。仿真结果表明,当网络足够大时,算法收敛。
{"title":"Distributed detection over connected networks via one-bit quantizer","authors":"Shengyu Zhu, Biao Chen","doi":"10.1109/ISIT.2016.7541554","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541554","url":null,"abstract":"This paper considers distributed detection over large scale connected networks with arbitrary topology. Contrasting to the canonical parallel fusion network where a single node has access to the outputs from all other sensors, each node can only exchange one-bit information with its direct neighbors in the present setting. Our approach adopts a novel consensus reaching algorithm using asymmetric bounded quantizers that allow controllable consensus error. Under the Neyman-Pearson criterion, we show that, with each sensor employing an identical one-bit quantizer for local information exchange, this approach achieves the optimal error exponent of centralized detection provided that the algorithm converges. Simulations show that the algorithm converges when the network is large enough.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116492313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information concentration for convex measures 凸度量的信息集中
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541475
Jiange Li, M. Fradelizi, M. Madiman
Sharp exponential deviation estimates for the information content as well as a sharp bound on the varentropy are obtained for convex probability measures on Euclidean spaces. These provide, in a sense, a nonasymptotic equipartition property for convex measures even in the absence of stationarity-type assumptions.
对于欧几里德空间上的凸概率测度,得到了信息量的急剧指数偏差估计和变异性的急剧界。在某种意义上,这些提供了凸测度的非渐近均分性质,即使在没有平稳型假设的情况下。
{"title":"Information concentration for convex measures","authors":"Jiange Li, M. Fradelizi, M. Madiman","doi":"10.1109/ISIT.2016.7541475","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541475","url":null,"abstract":"Sharp exponential deviation estimates for the information content as well as a sharp bound on the varentropy are obtained for convex probability measures on Euclidean spaces. These provide, in a sense, a nonasymptotic equipartition property for convex measures even in the absence of stationarity-type assumptions.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"205 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Throughput of two-hop wireless channels with queueing constraints and finite blocklength codes 具有排队约束和有限块长码的两跳无线信道的吞吐量
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541769
Yi Li, M. C. Gursoy, Senem Velipasalar
In this paper, throughput of two-hop wireless relay channels is studied in the finite blocklength regime. Half-duplex relay operation, in which the source node initially sends information to the intermediate relay node and the relay node subsequently forwards the messages to the destination, is considered. It is assumed that all messages are stored in buffers before being sent through the channel, and both the source node and the relay operate under statistical queueing constraints. After characterizing the transmission rates in the finite blocklength regime, the system throughput is formulated via queueing analysis. Subsequently, several properties of the throughput function in terms of system parameters are identified, and an efficient algorithm is proposed to maximize the throughput. Interplay between throughput, queueing constraints, relay location, time allocation, and code blocklength is investigated through numerical results.
本文研究了有限块长度条件下两跳无线中继信道的吞吐量问题。考虑源节点首先向中间中继节点发送信息,然后由中间中继节点转发到目的节点的半双工中继操作。假设所有消息在通过通道发送之前都存储在缓冲区中,并且源节点和中继都在统计队列约束下操作。在描述了有限块长体制下的传输速率后,通过排队分析得到了系统吞吐量。随后,识别了吞吐量函数在系统参数方面的几个性质,并提出了一种有效的吞吐量最大化算法。通过数值结果研究了吞吐量、排队约束、中继位置、时间分配和码块长度之间的相互作用。
{"title":"Throughput of two-hop wireless channels with queueing constraints and finite blocklength codes","authors":"Yi Li, M. C. Gursoy, Senem Velipasalar","doi":"10.1109/ISIT.2016.7541769","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541769","url":null,"abstract":"In this paper, throughput of two-hop wireless relay channels is studied in the finite blocklength regime. Half-duplex relay operation, in which the source node initially sends information to the intermediate relay node and the relay node subsequently forwards the messages to the destination, is considered. It is assumed that all messages are stored in buffers before being sent through the channel, and both the source node and the relay operate under statistical queueing constraints. After characterizing the transmission rates in the finite blocklength regime, the system throughput is formulated via queueing analysis. Subsequently, several properties of the throughput function in terms of system parameters are identified, and an efficient algorithm is proposed to maximize the throughput. Interplay between throughput, queueing constraints, relay location, time allocation, and code blocklength is investigated through numerical results.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Stationarity and ergodicity of stochastic non-linear systems controlled over communication channels 通信信道控制的随机非线性系统的平稳性和遍历性
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541728
S. Yüksel
This paper is concerned with the following problem: Given a stochastic non-linear system controlled over a noisy channel, what is the largest class of channels for which there exist coding and control policies so that the closed loop system is stochastically stable? Stochastic stability notions considered are stationarity, ergodicity or asymptotic mean stationarity. We do not restrict the state space to be compact, for example systems considered can be driven by unbounded noise. Necessary and sufficient conditions are obtained for a large class of systems and channels. A generalization of Bode's Integral Formula for a large class of non-linear systems and information channels is obtained.
本文研究以下问题:给定一个受噪声信道控制的随机非线性系统,存在使闭环系统随机稳定的编码和控制策略的最大信道类别是什么?考虑的随机稳定性概念是平稳性、遍历性或渐近平均平稳性。我们没有限制状态空间是紧致的,例如系统可以被无界噪声驱动。得到了一类系统和通道的充分必要条件。对一类非线性系统和信息通道的波德积分公式进行了推广。
{"title":"Stationarity and ergodicity of stochastic non-linear systems controlled over communication channels","authors":"S. Yüksel","doi":"10.1109/ISIT.2016.7541728","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541728","url":null,"abstract":"This paper is concerned with the following problem: Given a stochastic non-linear system controlled over a noisy channel, what is the largest class of channels for which there exist coding and control policies so that the closed loop system is stochastically stable? Stochastic stability notions considered are stationarity, ergodicity or asymptotic mean stationarity. We do not restrict the state space to be compact, for example systems considered can be driven by unbounded noise. Necessary and sufficient conditions are obtained for a large class of systems and channels. A generalization of Bode's Integral Formula for a large class of non-linear systems and information channels is obtained.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130465830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Sanders-Bogolyubov-Ruzsa theorem in Fpn and its application to non-malleable codes 再论Fpn中的Sanders-Bogolyubov-Ruzsa定理及其在非延展性码中的应用
Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541513
Divesh Aggarwal, J. Briët
Non-malleable codes (NMCs) protect sensitive data against degrees of corruption that prohibit error detection, ensuring instead that a corrupted codeword decodes correctly or to something that bears little relation to the original message. The split-state model, in which codewords consist of two blocks, considers adversaries who tamper with either block arbitrarily but independently of the other. The simplest construction in this model, due to Aggarwal, Dodis, and Lovett (STOC'14), was shown to give NMCs sending k-bit messages to O(k7)-bit codewords. It is conjectured, however, that the construction allows linear-length codewords. Towards resolving this conjecture, we show that the construction allows for code-length O(k5). This is achieved by analysing a special case of Sanders's Bogolyubov-Ruzsa theorem for general Abelian groups. Closely following the excellent exposition of this result for the group F2n by Lovett, we expose its dependence on p for the group Fpn, where p is a prime.linear-length codewords.Bogolyubov-Ruzsa theorem
不可延展性代码(nmc)保护敏感数据不受禁止错误检测的损坏程度的影响,而是确保损坏的码字能够正确解码或解码到与原始消息几乎没有关系的内容。在分裂状态模型中,码字由两个块组成,考虑任意篡改其中一个块但独立于另一个块的对手。Aggarwal, Dodis和Lovett (STOC'14)提出了该模型中最简单的构造,该构造显示nmc将k位消息发送到O(k7)位码字。然而,据推测,该结构允许线性长度的码字。为了解决这个猜想,我们证明了该结构允许码长为0 (k5)。这是通过分析一般阿贝尔群的Sanders Bogolyubov-Ruzsa定理的一个特例来实现的。紧随着洛维特对群F2n的出色阐述,我们揭示了它对群Fpn的依赖,其中p是素数。linear-length密语。Bogolyubov-Ruzsa定理
{"title":"Revisiting the Sanders-Bogolyubov-Ruzsa theorem in Fpn and its application to non-malleable codes","authors":"Divesh Aggarwal, J. Briët","doi":"10.1109/ISIT.2016.7541513","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541513","url":null,"abstract":"Non-malleable codes (NMCs) protect sensitive data against degrees of corruption that prohibit error detection, ensuring instead that a corrupted codeword decodes correctly or to something that bears little relation to the original message. The split-state model, in which codewords consist of two blocks, considers adversaries who tamper with either block arbitrarily but independently of the other. The simplest construction in this model, due to Aggarwal, Dodis, and Lovett (STOC'14), was shown to give NMCs sending k-bit messages to O(k7)-bit codewords. It is conjectured, however, that the construction allows linear-length codewords. Towards resolving this conjecture, we show that the construction allows for code-length O(k5). This is achieved by analysing a special case of Sanders's Bogolyubov-Ruzsa theorem for general Abelian groups. Closely following the excellent exposition of this result for the group F2n by Lovett, we expose its dependence on p for the group Fpn, where p is a prime.linear-length codewords.Bogolyubov-Ruzsa theorem","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2016 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1