首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
On transmission of multiple Gaussian sources over a Gaussian MAC using a VQLC mapping 用VQLC映射在高斯MAC上传输多个高斯源
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404726
Pål Anders Floor, A. N. Kim, T. Ramstad, I. Balasingham
In this paper we generalize an existing distributed zero-delay joint source-channel coding scheme for communication of a multivariate Gaussian on a Gaussian Multiple Access Channel named Distributed Quantization Linear Coder (DQLC) to arbitrary code length. Although the DQLC is well performing, it leaves a certain gap to the performance upper bound (or distortion lower bound) based on arbitrary code length. The purpose of this paper is to determine if the generalization of the DQLC to arbitrary code length, named Vector Quantization Linear Coder (VQLC), can close the gap to the bound when the code length is large. Our results show that the VQLC mapping has the potential to reach the upper bound for any number of Gaussian sources at high SNR when the sources are uncorrelated. We also approximately determine the VQLC performance as a function of code length for the special case of two sources.
本文将现有的一种用于高斯多址信道上多元高斯通信的分布式零延迟联合源信道编码方案——分布式量化线性编码器推广到任意码长。DQLC虽然性能良好,但在任意码长的情况下,与性能上界(或失真下界)有一定的差距。本文的目的是确定将DQLC泛化到任意码长,称为矢量量化线性编码器(Vector quanti量化Linear Coder, VQLC),当码长较大时,是否能缩小与界的差距。我们的结果表明,当源不相关时,VQLC映射有可能在高信噪比下达到任意数量的高斯源的上界。对于两个源的特殊情况,我们还近似确定了VQLC性能作为代码长度的函数。
{"title":"On transmission of multiple Gaussian sources over a Gaussian MAC using a VQLC mapping","authors":"Pål Anders Floor, A. N. Kim, T. Ramstad, I. Balasingham","doi":"10.1109/ITW.2012.6404726","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404726","url":null,"abstract":"In this paper we generalize an existing distributed zero-delay joint source-channel coding scheme for communication of a multivariate Gaussian on a Gaussian Multiple Access Channel named Distributed Quantization Linear Coder (DQLC) to arbitrary code length. Although the DQLC is well performing, it leaves a certain gap to the performance upper bound (or distortion lower bound) based on arbitrary code length. The purpose of this paper is to determine if the generalization of the DQLC to arbitrary code length, named Vector Quantization Linear Coder (VQLC), can close the gap to the bound when the code length is large. Our results show that the VQLC mapping has the potential to reach the upper bound for any number of Gaussian sources at high SNR when the sources are uncorrelated. We also approximately determine the VQLC performance as a function of code length for the special case of two sources.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Privacy amplification theorem for bounded storage eavesdropper 有界存储窃听器的隐私放大定理
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404652
Shun Watanabe, Y. Oohama
In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve's storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.
在本文中,我们考虑这样一种情况:合法各方Alice和Bob共享相同的源来生成密钥,而窃听者Eve可以访问存储在有限大小的存储中的相关数据。然后,Alice和Bob想要尽可能长地提取一个秘密。我们展示了这个问题的隐私放大定理,即,我们阐明了给定夏娃存储速率的密钥生成速率。该问题可以看作是Wyner-Ahlswede-Körner型源编码系统的对偶随机生成问题,并且在证明中使用的技术进行了交换,即在逆向部分使用所谓的马尔可夫引理,在正向部分使用所谓的图像尺寸表征。
{"title":"Privacy amplification theorem for bounded storage eavesdropper","authors":"Shun Watanabe, Y. Oohama","doi":"10.1109/ITW.2012.6404652","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404652","url":null,"abstract":"In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve's storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Common randomness amplification: A constructive view 共同随机性放大:建设性观点
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404693
Grégory Demay, U. Maurer
Common randomness is an important resource in many areas such as game theory and cryptography. We discuss the general problem of common randomness amplification between two distrustful parties connected by a communication channel and sharing some initial randomness. In this setting, both parties wish to agree on a common value distributed according to a target distribution by using their initial amount of common randomness and exchanging messages. Our results show that no protocol which is secure in a composable sense can significantly amplify the entropy initially shared by the parties.
普通随机性是博弈论和密码学等许多领域的重要资源。讨论了由通信信道连接并共享初始随机性的不信任双方之间共同随机性放大的一般问题。在这种情况下,双方希望通过使用他们的初始共同随机性量并交换消息,就根据目标分布分布的共同值达成一致。我们的研究结果表明,在可组合意义上安全的协议都不能显著地放大双方最初共享的熵。
{"title":"Common randomness amplification: A constructive view","authors":"Grégory Demay, U. Maurer","doi":"10.1109/ITW.2012.6404693","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404693","url":null,"abstract":"Common randomness is an important resource in many areas such as game theory and cryptography. We discuss the general problem of common randomness amplification between two distrustful parties connected by a communication channel and sharing some initial randomness. In this setting, both parties wish to agree on a common value distributed according to a target distribution by using their initial amount of common randomness and exchanging messages. Our results show that no protocol which is secure in a composable sense can significantly amplify the entropy initially shared by the parties.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On common information and the encoding of sources that are not successively refinable 关于公共信息和不能连续细化的源的编码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404641
Kumar Viswanatha, E. Akyol, Tejaswi Nanjundaswamy, K. Rose
This paper focuses on a new framework for scalable coding of information based on principles derived from common information of two dependent random variables. In the conventional successive refinement setting, the encoder generates two layers of information called the base layer and the enhancement layer. The first decoder, which receives only the base layer, produces a coarse reconstruction of the source, whereas the second decoder, which receives both the layers, uses the enhancement layer to refine the information further leading to a finer reconstruction. It is popularly known that asymptotic rate-distortion optimality at both the decoders is possible if and only if the source-distortion pair is successively refinable. However when the source is not successively refinable under the given distortion metric, it is impossible to achieve rate-distortion optimality at both the layers simultaneously. For this reason, most practical system designers resort to storing two individual representations of the source leading to significant overhead in transmission/storage costs. Inspired by the breadth of applications, in this paper, we propose a new framework for scalable coding wherein a subset of the bits sent to the first decoder is not sent to the second decoder. That is, the encoder generates one common bit stream which is routed to both the decoders, but unlike the conventional successive refinement setting, both the decoders receive an additional individual bitstream. By relating the proposed framework with the problem of common information of two dependent random variables, we derive a single letter characterization for the minimum sum rate achievable for the proposed setting when the two decoders are constrained to receive information at their respective rate-distortion functions. We show using a simple example that the proposed framework provides a strictly better asymptotic sum rate as opposed to the conventional scalable coding setup when the source-distortion pair is not successively refinable.
基于两个相关随机变量的公共信息导出的原理,提出了一种新的信息可扩展编码框架。在传统的连续细化设置中,编码器产生两层信息,称为基础层和增强层。仅接收基础层的第一解码器产生源的粗重建,而接收两层的第二解码器使用增强层进一步细化信息导致更精细的重建。众所周知,当且仅当源-失真对连续可细化时,两个解码器的渐近率失真最优性是可能的。然而,当在给定的失真度量下源不能连续细化时,不可能在两层同时实现率失真最优性。出于这个原因,大多数实际的系统设计人员采用存储源的两种单独表示,导致传输/存储成本的显著开销。受到广泛应用的启发,在本文中,我们提出了一种新的可扩展编码框架,其中发送到第一个解码器的比特子集不会发送到第二个解码器。也就是说,编码器生成一个公共比特流,该比特流被路由到两个解码器,但与传统的连续细化设置不同,两个解码器都接收一个额外的单个比特流。通过将所提出的框架与两个相关随机变量的公共信息问题联系起来,我们推导出了当两个解码器被约束以各自的速率失真函数接收信息时,所提出的设置可实现的最小和速率的单个字母表征。我们使用一个简单的例子表明,当源-失真对不能连续细化时,与传统的可扩展编码设置相比,所提出的框架提供了严格更好的渐近和速率。
{"title":"On common information and the encoding of sources that are not successively refinable","authors":"Kumar Viswanatha, E. Akyol, Tejaswi Nanjundaswamy, K. Rose","doi":"10.1109/ITW.2012.6404641","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404641","url":null,"abstract":"This paper focuses on a new framework for scalable coding of information based on principles derived from common information of two dependent random variables. In the conventional successive refinement setting, the encoder generates two layers of information called the base layer and the enhancement layer. The first decoder, which receives only the base layer, produces a coarse reconstruction of the source, whereas the second decoder, which receives both the layers, uses the enhancement layer to refine the information further leading to a finer reconstruction. It is popularly known that asymptotic rate-distortion optimality at both the decoders is possible if and only if the source-distortion pair is successively refinable. However when the source is not successively refinable under the given distortion metric, it is impossible to achieve rate-distortion optimality at both the layers simultaneously. For this reason, most practical system designers resort to storing two individual representations of the source leading to significant overhead in transmission/storage costs. Inspired by the breadth of applications, in this paper, we propose a new framework for scalable coding wherein a subset of the bits sent to the first decoder is not sent to the second decoder. That is, the encoder generates one common bit stream which is routed to both the decoders, but unlike the conventional successive refinement setting, both the decoders receive an additional individual bitstream. By relating the proposed framework with the problem of common information of two dependent random variables, we derive a single letter characterization for the minimum sum rate achievable for the proposed setting when the two decoders are constrained to receive information at their respective rate-distortion functions. We show using a simple example that the proposed framework provides a strictly better asymptotic sum rate as opposed to the conventional scalable coding setup when the source-distortion pair is not successively refinable.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128391862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
From channel codes to computation codes 从信道码到计算码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404688
François Simon
In this paper, it is shown that a computation code exists for a stationary and ̅d-continuous noisy computation if a channel code exists for the “virtual” channel linking the expected result of the perfect computation and the actual result given by the noisy computation. This proves the possibility to built an efficient computation code from an efficient channel code.
本文证明,如果存在连接完美计算的预期结果和噪声计算的实际结果的“虚拟”信道的信道码,则存在平稳连续噪声计算的计算码。这证明了从有效的信道代码构建有效的计算代码的可能性。
{"title":"From channel codes to computation codes","authors":"François Simon","doi":"10.1109/ITW.2012.6404688","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404688","url":null,"abstract":"In this paper, it is shown that a computation code exists for a stationary and ̅d-continuous noisy computation if a channel code exists for the “virtual” channel linking the expected result of the perfect computation and the actual result given by the noisy computation. This proves the possibility to built an efficient computation code from an efficient channel code.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Witsenhausen's counterexample: The asymptotic vector case 关于Witsenhausen反例:渐近向量情况
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404649
Chiranjib Choudhuri, U. Mitra
Motivated by the presence of an implicit communication channel in the asymptotic version of Witsenhausen's counterexample, implicit discrete memoryless channels (IDMC) with discrete memoryless (DM) states are considered. Information-theoretic lower and upper bounds (based respectively on the ideas from rate-distortion theory and hybrid-coding) are derived on the optimal distortion in estimating the input of the implicit channel. The intuition gained from the DMIC with DM state model is then used to evaluate the optimal distortion for the asymptotic version of the Witsenhausen counterexample. The minimum distortion is characterized for the counterexample and it is shown that a combination of linear coding and dirty-paper coding (DPC) proposed in [1] achieves the minimum distortion.
由于在Witsenhausen反例的渐近版本中存在隐式通信信道,考虑了具有离散无记忆(DM)状态的隐式离散无记忆信道(IDMC)。在估计隐式信道输入时,分别基于率失真理论和混合编码的思想推导出了最优失真的信息论下界和上界。从DM状态模型的DMIC中获得的直觉,然后用于评估Witsenhausen反例的渐近版本的最优失真。对反例进行了最小失真的表征,结果表明,[1]中提出的线性编码和脏纸编码(DPC)的组合实现了最小失真。
{"title":"On Witsenhausen's counterexample: The asymptotic vector case","authors":"Chiranjib Choudhuri, U. Mitra","doi":"10.1109/ITW.2012.6404649","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404649","url":null,"abstract":"Motivated by the presence of an implicit communication channel in the asymptotic version of Witsenhausen's counterexample, implicit discrete memoryless channels (IDMC) with discrete memoryless (DM) states are considered. Information-theoretic lower and upper bounds (based respectively on the ideas from rate-distortion theory and hybrid-coding) are derived on the optimal distortion in estimating the input of the implicit channel. The intuition gained from the DMIC with DM state model is then used to evaluate the optimal distortion for the asymptotic version of the Witsenhausen counterexample. The minimum distortion is characterized for the counterexample and it is shown that a combination of linear coding and dirty-paper coding (DPC) proposed in [1] achieves the minimum distortion.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
LDPC-based coded cooperative jamming codes 基于ldpc的编码协同干扰码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404716
A. Pierrot, M. Bloch
We present a practical coded cooperative jamming scheme for the problem of secure communications over the two-way wiretap channel. We design low-density parity-check (LDPC) based codes whose codewords interfere at the eavesdropper's terminal, thus providing secrecy. We show that our scheme can guarantee low information leakage rate, and we assess its precise performance for classical and spatially coupled LDPC codes.
针对双向窃听信道上的安全通信问题,提出了一种实用的编码协同干扰方案。我们设计了基于低密度奇偶校验(LDPC)的码,其码字干扰窃听者的终端,从而提供了保密性。结果表明,该方案可以保证较低的信息泄漏率,并对经典LDPC码和空间耦合LDPC码的精确性能进行了评估。
{"title":"LDPC-based coded cooperative jamming codes","authors":"A. Pierrot, M. Bloch","doi":"10.1109/ITW.2012.6404716","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404716","url":null,"abstract":"We present a practical coded cooperative jamming scheme for the problem of secure communications over the two-way wiretap channel. We design low-density parity-check (LDPC) based codes whose codewords interfere at the eavesdropper's terminal, thus providing secrecy. We show that our scheme can guarantee low information leakage rate, and we assess its precise performance for classical and spatially coupled LDPC codes.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117049174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On feedback, cribbing, and causal state-information on the multiple-access channel 多址信道上的反馈、抓取和因果状态信息
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404642
A. Bracher, A. Lapidoth, Y. Steinberg
We show that the capacity region of the state-dependent multiple-access channel (SD-MAC) with strictly-causally cribbing encoders is not enlarged if strictly-causal state-information (SI) and feedback are furnished to the encoders. We also derive the capacity region of the SD-MAC with causal SI at the cribbing encoders and show that Shannon strategies are optimal. Such strategies are generally suboptimal if the encoders access distinct SI. However, Shannon strategies are optimal and we have a characterization of the capacity region for the case where both encoders crib, causal SI is revealed to one encoder, and feedback is available to the other encoder.
研究表明,如果向编码器提供严格因果状态信息(SI)和反馈,则具有严格因果编码器的状态相关多址信道(SD-MAC)的容量区域不会扩大。我们还推导出了在cribbing编码器处具有因果SI的SD-MAC的容量区域,并证明了Shannon策略是最优的。如果编码器访问不同的SI,这种策略通常是次优的。然而,香农策略是最优的,我们对两个编码器都匹配的情况下的容量区域进行了表征,其中一个编码器显示因果SI,而另一个编码器可以获得反馈。
{"title":"On feedback, cribbing, and causal state-information on the multiple-access channel","authors":"A. Bracher, A. Lapidoth, Y. Steinberg","doi":"10.1109/ITW.2012.6404642","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404642","url":null,"abstract":"We show that the capacity region of the state-dependent multiple-access channel (SD-MAC) with strictly-causally cribbing encoders is not enlarged if strictly-causal state-information (SI) and feedback are furnished to the encoders. We also derive the capacity region of the SD-MAC with causal SI at the cribbing encoders and show that Shannon strategies are optimal. Such strategies are generally suboptimal if the encoders access distinct SI. However, Shannon strategies are optimal and we have a characterization of the capacity region for the case where both encoders crib, causal SI is revealed to one encoder, and feedback is available to the other encoder.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"143 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On multicasting nested message sets over combination networks 在组合网络上多播嵌套消息集
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404696
S. S. Bidokhti, V. Prabhakaran, S. Diggavi
In this paper, we study delivery of two nested message sets over combination networks with an arbitrary number of receivers, where a subset of receivers (public receivers) demand only the lower priority message and a subset of receivers (private receivers) demand both the lower and the higher priority messages. We give a complete rate region characterization over combination networks with three public and any number of private receivers, where achievability is through linear coding. Our encoding scheme is general and characterizes an achievable region for arbitrary number of public and private receivers.
在本文中,我们研究了在具有任意数量接收者的组合网络上两个嵌套消息集的传递,其中接收者子集(公共接收者)只需要较低优先级的消息,而接收者子集(私有接收者)同时需要较低和较高优先级的消息。我们给出了具有三个公共和任意数量私有接收器的组合网络的完整速率区域表征,其中可通过线性编码实现。我们的编码方案是通用的,并为任意数量的公共和私有接收器提供了一个可实现的区域。
{"title":"On multicasting nested message sets over combination networks","authors":"S. S. Bidokhti, V. Prabhakaran, S. Diggavi","doi":"10.1109/ITW.2012.6404696","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404696","url":null,"abstract":"In this paper, we study delivery of two nested message sets over combination networks with an arbitrary number of receivers, where a subset of receivers (public receivers) demand only the lower priority message and a subset of receivers (private receivers) demand both the lower and the higher priority messages. We give a complete rate region characterization over combination networks with three public and any number of private receivers, where achievability is through linear coding. Our encoding scheme is general and characterizes an achievable region for arbitrary number of public and private receivers.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The complexity of information theoretic secure computation 信息论安全计算的复杂性
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404768
Y. Ishai
Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.
只提供摘要形式。用于安全计算的协议允许两方或多方对其本地输入执行分布式计算,同时对彼此隐藏输入。在所谓的安全计算的“信息理论”设置中,假设各方通过安全通道进行通信,并且即使对计算无界的各方,输入也应该保持隐藏。众所周知,当存在大多数诚实的参与方时,或者当参与方可以访问某些类型的相关秘密随机性时,每个计算都可以安全地完成。然而,这种安全计算的真正成本仍然是公开的。这次演讲将调查这一领域的一些最新进展和悬而未决的问题。
{"title":"The complexity of information theoretic secure computation","authors":"Y. Ishai","doi":"10.1109/ITW.2012.6404768","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404768","url":null,"abstract":"Summary form only given. A protocol for secure computation allows two or more parties to perform a distributed computation on their local inputs while hiding the inputs from each other. In the so-called “information theoretic” setting for secure computation, the parties are assumed to communicate over secure channels and the inputs should remain hidden even from computationally unbounded parties. It is known that every computation can done securely when there is a majority of honest parties, or alternatively when the parties are given access to certain types of correlated secret randomness. However, the true cost of such secure computations remains wide open. The talk will survey some recent progress and open questions in this area.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1