首页 > 最新文献

2016 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Energy complexity of polar codes 极性码的能量复杂度
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541411
Christopher G. Blake, F. Kschischang
Sequences of VLSI circuits implemented according to the Thompson VLSI model that compute encoding and decoding functions, called coding schemes, are classified according to the rate at which their associated block error probability scales with block length N. It is shown that coding schemes for binary symmetric channels with probability of error that scales as O(f(N)) must have encoding and decoding energy that scales at least as Ω(N√(-ln f (N))). Polar coding schemes of rate greater than 1/2 are shown to have encoding and decoding energy that scales at least as Ω(N3/2). This lower bound is achievable up to polylogarithmic factors on a mesh-network.
根据Thompson VLSI模型实现的计算编码和解码功能的VLSI电路序列,称为编码方案,根据其相关块错误概率随块长度N的比例进行分类。结果表明,误差概率为O(f(N))的二进制对称信道的编码方案必须具有至少缩放为Ω(N√(-ln f(N)))的编码和解码能量。速率大于1/2的极性编码方案的编码和解码能量至少为Ω(N3/2)。这个下界可以在网格网络上达到多对数因子。
{"title":"Energy complexity of polar codes","authors":"Christopher G. Blake, F. Kschischang","doi":"10.1109/ISIT.2016.7541411","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541411","url":null,"abstract":"Sequences of VLSI circuits implemented according to the Thompson VLSI model that compute encoding and decoding functions, called coding schemes, are classified according to the rate at which their associated block error probability scales with block length N. It is shown that coding schemes for binary symmetric channels with probability of error that scales as O(f(N)) must have encoding and decoding energy that scales at least as Ω(N√(-ln f (N))). Polar coding schemes of rate greater than 1/2 are shown to have encoding and decoding energy that scales at least as Ω(N3/2). This lower bound is achievable up to polylogarithmic factors on a mesh-network.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computing linear transforms with unreliable components 计算不可靠分量的线性变换
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541636
Yaoqing Yang, P. Grover, S. Kar
We consider the problem of computing a binary linear transform when all circuit components are unreliable. We propose a novel “ENCODED” technique that uses LDPC (low-density parity-check) codes and embedded noisy decoders to keep the error probability of the computation below a small constant independent of the size of the linear transform, even when all logic gates in the computation are prone to probabilistic errors. Unlike existing works on applying coding to computing with unreliable components, the “ENCODED” technique explicitly considers the errors that happen during both the encoding and the decoding phases. Further, we show that ENCODED requires fewer operations (in order sense) than repetition techniques.
研究了当所有电路元件都不可靠时的二元线性变换计算问题。我们提出了一种新的“ENCODED”技术,该技术使用LDPC(低密度奇偶校验)编码和嵌入式噪声解码器来保持计算的错误概率低于一个与线性变换大小无关的小常数,即使在计算中的所有逻辑门都容易出现概率错误。与现有的将编码应用于不可靠组件的计算的工作不同,“ENCODED”技术明确地考虑了编码和解码阶段发生的错误。此外,我们表明,与重复技术相比,ENCODED需要更少的操作(在顺序意义上)。
{"title":"Computing linear transforms with unreliable components","authors":"Yaoqing Yang, P. Grover, S. Kar","doi":"10.1109/ISIT.2016.7541636","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541636","url":null,"abstract":"We consider the problem of computing a binary linear transform when all circuit components are unreliable. We propose a novel “ENCODED” technique that uses LDPC (low-density parity-check) codes and embedded noisy decoders to keep the error probability of the computation below a small constant independent of the size of the linear transform, even when all logic gates in the computation are prone to probabilistic errors. Unlike existing works on applying coding to computing with unreliable components, the “ENCODED” technique explicitly considers the errors that happen during both the encoding and the decoding phases. Further, we show that ENCODED requires fewer operations (in order sense) than repetition techniques.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115931777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the design of universal schemes for massive uncoordinated multiple access 大规模非协调多址通用方案的设计
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541318
Austin Taghavi, Avinash Vem, J. Chamberland, K. Narayanan
Future wireless access points may have to support sporadic transmissions from a massive number of unattended machines. Recently, there has been a lot of interest in the design of massive uncoordinated multiple access schemes for such systems based on clever enhancements to slotted ALOHA. A close connection has been established between the design of the multiple access scheme and the design of low density generator matrix codes. Based on this connection, optimal multiple access schemes have been designed based on slotted ALOHA and successive interference cancellation, assuming that the number of users in the network is known at the transmitters. In this paper, we extend this work and consider the design of universal uncoordinated multiple access schemes that are agnostic to the number of users in the network. We design Markov chain based transmission policies and numerical results show that substantial improvement to slotted ALOHA is possible.
未来的无线接入点可能必须支持来自大量无人值守机器的零星传输。最近,人们对基于槽ALOHA的智能增强的此类系统的大规模非协调多址方案的设计非常感兴趣。多址方案的设计与低密度发生器矩阵码的设计之间建立了密切的联系。在此基础上,假设发射机知道网络中的用户数量,设计了基于有槽ALOHA和连续干扰消除的最优多址方案。在本文中,我们扩展了这项工作,并考虑了与网络中用户数量无关的通用非协调多址方案的设计。我们设计了基于马尔可夫链的传输策略,数值结果表明对开槽ALOHA有很大的改进是可能的。
{"title":"On the design of universal schemes for massive uncoordinated multiple access","authors":"Austin Taghavi, Avinash Vem, J. Chamberland, K. Narayanan","doi":"10.1109/ISIT.2016.7541318","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541318","url":null,"abstract":"Future wireless access points may have to support sporadic transmissions from a massive number of unattended machines. Recently, there has been a lot of interest in the design of massive uncoordinated multiple access schemes for such systems based on clever enhancements to slotted ALOHA. A close connection has been established between the design of the multiple access scheme and the design of low density generator matrix codes. Based on this connection, optimal multiple access schemes have been designed based on slotted ALOHA and successive interference cancellation, assuming that the number of users in the network is known at the transmitters. In this paper, we extend this work and consider the design of universal uncoordinated multiple access schemes that are agnostic to the number of users in the network. We design Markov chain based transmission policies and numerical results show that substantial improvement to slotted ALOHA is possible.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Delay-constrained capacity for broadcast erasure channels: A linear-coding-based study 广播擦除信道的延迟约束容量:基于线性编码的研究
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541830
Chih-Chun Wang
Supporting delay-sensitive traffic is critical to the next-generation communication network. This work studies the 1-to-2 broadcast packet erasure channels with causal ACKnowledgement (ACK), which is motivated by practical downlink access point networks. While the corresponding delay-constrained Shannon capacity remains an open problem (no existing analysis tools can be directly applied), this work focuses on linear codes and proposes three new definitions of delay-constrained throughput based on different outage metrics: the file-based, the rank-based, and the packet-based ones. It then fully characterizes the corresponding linear coding capacity regions for relatively-short-delay flows - flows for which the delay requirement is no larger than the interval of file arrivals.
支持对延迟敏感的业务是下一代通信网络的关键。本文研究了具有因果确认(ACK)的1对2广播包擦除信道,该信道是由实际下行接入点网络驱动的。虽然相应的延迟约束香农容量仍然是一个开放的问题(没有现有的分析工具可以直接应用),但这项工作侧重于线性代码,并提出了基于不同中断度量的延迟约束吞吐量的三种新定义:基于文件的,基于秩的和基于包的。然后,它充分表征了相对较短延迟流的相应线性编码容量区域-延迟要求不大于文件到达间隔的流。
{"title":"Delay-constrained capacity for broadcast erasure channels: A linear-coding-based study","authors":"Chih-Chun Wang","doi":"10.1109/ISIT.2016.7541830","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541830","url":null,"abstract":"Supporting delay-sensitive traffic is critical to the next-generation communication network. This work studies the 1-to-2 broadcast packet erasure channels with causal ACKnowledgement (ACK), which is motivated by practical downlink access point networks. While the corresponding delay-constrained Shannon capacity remains an open problem (no existing analysis tools can be directly applied), this work focuses on linear codes and proposes three new definitions of delay-constrained throughput based on different outage metrics: the file-based, the rank-based, and the packet-based ones. It then fully characterizes the corresponding linear coding capacity regions for relatively-short-delay flows - flows for which the delay requirement is no larger than the interval of file arrivals.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134444505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weight distribution of the syndrome of linear codes and connections to combinatorial designs 线性码与组合设计关联的权重分布
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541857
C. Pacher, Philipp Grabenweger, D. Simos
The expectation and the variance of the syndrome weight distribution of linear codes after transmission of codewords through a binary symmetric channel are derived exactly in closed form as functions of the code's parity-check matrix and of the degree distributions of the associated Tanner graph. The influence of (check) regularity of the Tanner graph is studied. Special attention is payed to Tanner graphs that have no cycles of length four. We further study the equivalence of some classes of combinatorial designs and important classes of LDPC codes and apply our general results to those more specific structures. Simulations validate the analytical results and show that the actual cumulative distribution function of the syndrome weight is close to that of a normal distribution.
通过二进制对称信道传输码字后,线性码的证权分布的期望和方差以码的奇偶校验矩阵和相关坦纳图的度分布的函数的封闭形式精确导出。研究了坦纳图正则性的影响。特别注意没有长度为4的循环的坦纳图。我们进一步研究了组合设计的某些类别和LDPC规范的重要类别的等价性,并将我们的一般结果应用于那些更具体的结构。仿真结果验证了分析结果,表明实际的综合征权重累积分布函数接近于正态分布函数。
{"title":"Weight distribution of the syndrome of linear codes and connections to combinatorial designs","authors":"C. Pacher, Philipp Grabenweger, D. Simos","doi":"10.1109/ISIT.2016.7541857","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541857","url":null,"abstract":"The expectation and the variance of the syndrome weight distribution of linear codes after transmission of codewords through a binary symmetric channel are derived exactly in closed form as functions of the code's parity-check matrix and of the degree distributions of the associated Tanner graph. The influence of (check) regularity of the Tanner graph is studied. Special attention is payed to Tanner graphs that have no cycles of length four. We further study the equivalence of some classes of combinatorial designs and important classes of LDPC codes and apply our general results to those more specific structures. Simulations validate the analytical results and show that the actual cumulative distribution function of the syndrome weight is close to that of a normal distribution.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Universally Secure Network Coding with feedback 带反馈的普遍安全网络编码
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541717
G. Spini, G. Zémor
In the model of Secure Network Coding, a sender is connected to several receivers by a network, i.e. a directed graph with a single source node and several destination nodes, where each node can perform operations on the values received via the incoming edges and sends the results via the outbound edges. An active adversary controls some of the edges; this means that he can read every symbol transmitted over the edges under his control and replace them with symbols of his choice. The goal of Secure Network Coding is to design protocols that allow transmission of a secret message from the sender to all receivers in a private and reliable way. Classically, only one-way communication (from sender to receivers) has been studied; in this setting, security can be guaranteed as long as the number of edges controlled by the adversary is less than one third of the network connectivity. In this paper, we present a procedure where receivers are allowed to send feedback to the sender; with this feature, security is guaranteed against a stronger adversary: namely, the number of corrupted edges only needs to be smaller than one half of the connectivity. Furthermore, like previous state-of-the-art work on the single-round scenario, our scheme is universal, i.e. it does not require knowledge of the network code.
在安全网络编码模型中,一个发送方通过一个网络连接到多个接收方,即一个有向图,有单个源节点和多个目的节点,其中每个节点可以对通过入边接收到的值进行操作,并通过出边发送结果。一个积极的对手控制着一些边缘;这意味着他可以读取在他控制下的边缘传输的每一个符号,并用他选择的符号替换它们。安全网络编码的目标是设计一种协议,允许以一种私密和可靠的方式将秘密消息从发送方传输到所有接收方。传统上,只研究了单向通信(从发送方到接收方);在这种情况下,只要攻击者控制的边缘数量少于网络连接的三分之一,就可以保证安全性。在本文中,我们提出了一个允许接收方向发送方发送反馈的过程;有了这个特性,安全性得到了保证,不会受到更强的攻击:也就是说,损坏边的数量只需要小于连接的一半。此外,就像之前最先进的单轮场景工作一样,我们的方案是通用的,即它不需要了解网络代码。
{"title":"Universally Secure Network Coding with feedback","authors":"G. Spini, G. Zémor","doi":"10.1109/ISIT.2016.7541717","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541717","url":null,"abstract":"In the model of Secure Network Coding, a sender is connected to several receivers by a network, i.e. a directed graph with a single source node and several destination nodes, where each node can perform operations on the values received via the incoming edges and sends the results via the outbound edges. An active adversary controls some of the edges; this means that he can read every symbol transmitted over the edges under his control and replace them with symbols of his choice. The goal of Secure Network Coding is to design protocols that allow transmission of a secret message from the sender to all receivers in a private and reliable way. Classically, only one-way communication (from sender to receivers) has been studied; in this setting, security can be guaranteed as long as the number of edges controlled by the adversary is less than one third of the network connectivity. In this paper, we present a procedure where receivers are allowed to send feedback to the sender; with this feature, security is guaranteed against a stronger adversary: namely, the number of corrupted edges only needs to be smaller than one half of the connectivity. Furthermore, like previous state-of-the-art work on the single-round scenario, our scheme is universal, i.e. it does not require knowledge of the network code.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134315351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online policies for multiple access channel with common energy harvesting source 具有共同能量收集源的多通道在线策略
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541797
Abdulrahman Baknina, S. Ulukus
We consider online transmission policies for the two-user multiple access channel, where both users harvest energy from a common source. The transmitters are equipped with arbitrary but finite-sized batteries. The energy harvests are independent and identically distributed (i.i.d.) over time, and synchronized at the two users due to their common source. The transmitters know the energy arrivals only causally. We first consider the special case of Bernoulli energy arrivals. For this case, we determine the optimal policies that achieve the boundary of the capacity region. We show that the optimal power allocation decreases in time, and that the capacity region is a pentagon. We then consider general i.i.d. energy arrivals, and propose a distributed fractional power (DFP) policy. We develop lower and upper bounds on the performance of the proposed DFP policy for general i.i.d. energy arrivals, and show that the proposed DFP is near-optimal in that it yields rates which are within a constant gap of the derived lower and upper bounds.
我们考虑了双用户多址通道的在线传输策略,其中两个用户从一个共同的源获取能量。发射机配备了任意大小但尺寸有限的电池。随着时间的推移,能量收获是独立和相同分布的(i.i.d),并且由于它们的共同来源,在两个用户处同步。发射器只是偶然地知道能量到达。我们首先考虑伯努利能量到达的特殊情况。对于这种情况,我们确定了达到容量区域边界的最优策略。结果表明,最优功率分配随时间递减,容量区域呈五边形。然后,我们考虑一般i.i.d能量到达,并提出一个分布式分数功率(DFP)策略。对于一般的i.i.d能量到达,我们开发了所提出的DFP策略性能的下界和上界,并表明所提出的DFP是接近最优的,因为它产生的比率在推导的下界和上界的恒定间隙内。
{"title":"Online policies for multiple access channel with common energy harvesting source","authors":"Abdulrahman Baknina, S. Ulukus","doi":"10.1109/ISIT.2016.7541797","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541797","url":null,"abstract":"We consider online transmission policies for the two-user multiple access channel, where both users harvest energy from a common source. The transmitters are equipped with arbitrary but finite-sized batteries. The energy harvests are independent and identically distributed (i.i.d.) over time, and synchronized at the two users due to their common source. The transmitters know the energy arrivals only causally. We first consider the special case of Bernoulli energy arrivals. For this case, we determine the optimal policies that achieve the boundary of the capacity region. We show that the optimal power allocation decreases in time, and that the capacity region is a pentagon. We then consider general i.i.d. energy arrivals, and propose a distributed fractional power (DFP) policy. We develop lower and upper bounds on the performance of the proposed DFP policy for general i.i.d. energy arrivals, and show that the proposed DFP is near-optimal in that it yields rates which are within a constant gap of the derived lower and upper bounds.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Exploiting variational formulas for quantum relative entropy 利用量子相对熵的变分公式
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541818
M. Berta, Omar Fawzi, M. Tomamichel
The relative entropy is the basic concept underlying various information measures like entropy, conditional entropy and mutual information. Here, we discuss how to make use of variational formulas for measured relative entropy and quantum relative entropy for understanding the additivity properties of various entropic quantities that appear in quantum information theory. In particular, we show that certain lower bounds on quantum conditional mutual information are superadditive.
相对熵是各种信息度量的基本概念,如熵、条件熵和互信息。在这里,我们讨论如何利用测量相对熵和量子相对熵的变分公式来理解量子信息论中出现的各种熵的可加性。特别地,我们证明了量子条件互信息的某些下界是超加性的。
{"title":"Exploiting variational formulas for quantum relative entropy","authors":"M. Berta, Omar Fawzi, M. Tomamichel","doi":"10.1109/ISIT.2016.7541818","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541818","url":null,"abstract":"The relative entropy is the basic concept underlying various information measures like entropy, conditional entropy and mutual information. Here, we discuss how to make use of variational formulas for measured relative entropy and quantum relative entropy for understanding the additivity properties of various entropic quantities that appear in quantum information theory. In particular, we show that certain lower bounds on quantum conditional mutual information are superadditive.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Low complexity precoding for MIMOME wiretap channels based on cut-off rate 基于截止率的低复杂度MIMOME窃听信道预编码
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541847
S. R. Aghdam, T. Duman
We propose a low complexity transmit signal design scheme for achieving information-theoretic secrecy over a MIMO wiretap channel driven by finite-alphabet inputs. We assume that the transmitter has perfect channel state information (CSI) of the main channel and also knows the statistics of the eavesdropper's channel. The proposed transmission scheme relies on jointly optimizing the precoder matrix and the artificial noise so as to maximize the achievable secrecy rates. In order to lower the computational complexity associated with the transmit signal design, we employ a design metric using the cut-off rate instead of the mutual information. We formulate a gradient-descent based optimization algorithm and demonstrate via extensive numerical examples that the proposed signal design scheme can yield an enhanced secrecy performance compared with the existing solutions in spite of its relatively lower computational complexity. The impacts of the modulation order as well as the number of antennas at the transmitter and receiver ends on the achievable secrecy rates are also investigated.
我们提出了一种低复杂度的传输信号设计方案,用于在有限字母输入驱动的MIMO窃听信道上实现信息理论保密。我们假设发射机拥有完善的主信道信道状态信息(CSI),并且知道窃听者信道的统计信息。提出的传输方案依赖于联合优化预编码器矩阵和人工噪声,以最大限度地提高可实现的保密率。为了降低与发射信号设计相关的计算复杂度,我们采用了使用截止率而不是互信息的设计度量。我们制定了一种基于梯度下降的优化算法,并通过大量的数值实例证明,尽管所提出的信号设计方案的计算复杂度相对较低,但与现有解决方案相比,该方案可以提高保密性能。研究了调制顺序以及收发端天线个数对可实现保密率的影响。
{"title":"Low complexity precoding for MIMOME wiretap channels based on cut-off rate","authors":"S. R. Aghdam, T. Duman","doi":"10.1109/ISIT.2016.7541847","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541847","url":null,"abstract":"We propose a low complexity transmit signal design scheme for achieving information-theoretic secrecy over a MIMO wiretap channel driven by finite-alphabet inputs. We assume that the transmitter has perfect channel state information (CSI) of the main channel and also knows the statistics of the eavesdropper's channel. The proposed transmission scheme relies on jointly optimizing the precoder matrix and the artificial noise so as to maximize the achievable secrecy rates. In order to lower the computational complexity associated with the transmit signal design, we employ a design metric using the cut-off rate instead of the mutual information. We formulate a gradient-descent based optimization algorithm and demonstrate via extensive numerical examples that the proposed signal design scheme can yield an enhanced secrecy performance compared with the existing solutions in spite of its relatively lower computational complexity. The impacts of the modulation order as well as the number of antennas at the transmitter and receiver ends on the achievable secrecy rates are also investigated.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133554314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A p-ary MDPC scheme p-ary MDPC方案
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541520
Qian Guo, T. Johansson
The McEliece public key cryptosystem is an attractive general construction that has received extensive attention over the years. Recently, a very promising version called QC-MDPC, was proposed. By using binary quasi-cyclic codes, the size of the public key can be decreased significantly. The decryption step involves iterative decoding of moderate density parity check codes (MDPC). In this paper we propose a non-binary version of QC-MDPC. The errors in the new scheme are discrete Gaussian and the decryption involves a new type of iterative decoding with a non-binary alphabet. The resulting scheme improves upon the binary QC-MDPC in that the size of the pubic key can be even smaller.
McEliece公钥密码系统是一种有吸引力的通用结构,多年来受到了广泛的关注。最近,提出了一个非常有前途的版本,称为QC-MDPC。通过使用二进制准循环码,可以显著减小公钥的大小。解密步骤涉及中等密度奇偶校验码(MDPC)的迭代解码。本文提出了一种非二进制版本的QC-MDPC。新方案的误差是离散高斯的,解密涉及一种非二进制字母表的新型迭代解码。由此产生的方案改进了二进制QC-MDPC,因为公钥的大小可以更小。
{"title":"A p-ary MDPC scheme","authors":"Qian Guo, T. Johansson","doi":"10.1109/ISIT.2016.7541520","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541520","url":null,"abstract":"The McEliece public key cryptosystem is an attractive general construction that has received extensive attention over the years. Recently, a very promising version called QC-MDPC, was proposed. By using binary quasi-cyclic codes, the size of the public key can be decreased significantly. The decryption step involves iterative decoding of moderate density parity check codes (MDPC). In this paper we propose a non-binary version of QC-MDPC. The errors in the new scheme are discrete Gaussian and the decryption involves a new type of iterative decoding with a non-binary alphabet. The resulting scheme improves upon the binary QC-MDPC in that the size of the pubic key can be even smaller.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132140526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2016 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1