首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Sequentially Mixing Randomly Arriving Packets Improves Channel Dispersion Over Block-Based Designs 顺序混合随机到达的数据包比基于块的设计改善了信道分散
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834408
Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang
Channel dispersion quantifies the convergence speed of coding rate to channel capacity under different latency constraints. Under the setting of packet erasure channels (PECs) with Bernoulli packet arrivals, this work characterizes the channel dispersions of random linear streaming codes (RLSCs) and MDS block codes, respectively. New techniques are developed to quantify the channel dispersion of sequential (non-block-based) coding, the first in the literature. The channel dispersion expressions are then used to compare the levels of error protection between RLSCs and MDS block codes. The results show that if and only if the target error probability pe is smaller than a threshold (≈0.1774), RLSCs offer strictly stronger error protection than MDS block codes, which is on top of the already significant 50% latency savings of RLSCs that eliminate the queueing delay completely.
信道色散量化了在不同时延约束下编码速率对信道容量的收敛速度。在具有伯努利数据包到达的分组擦除信道(PECs)设置下,本研究分别表征了随机线性流码(RLSCs)和MDS分组码的信道色散。新技术的开发,以量化顺序(非基于块)编码的信道色散,第一次在文献中。然后使用信道色散表达式来比较RLSCs和MDS分组码之间的错误保护水平。结果表明,当且仅当目标错误概率pe小于阈值(≈0.1774)时,RLSCs比MDS分组码提供严格更强的错误保护,这是在RLSCs完全消除队列延迟的50%延迟节省的基础上实现的。
{"title":"Sequentially Mixing Randomly Arriving Packets Improves Channel Dispersion Over Block-Based Designs","authors":"Pin-Wen Su, Yu-Chih Huang, Shih-Chun Lin, I-Hsiang Wang, Chih-Chun Wang","doi":"10.1109/ISIT50566.2022.9834408","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834408","url":null,"abstract":"Channel dispersion quantifies the convergence speed of coding rate to channel capacity under different latency constraints. Under the setting of packet erasure channels (PECs) with Bernoulli packet arrivals, this work characterizes the channel dispersions of random linear streaming codes (RLSCs) and MDS block codes, respectively. New techniques are developed to quantify the channel dispersion of sequential (non-block-based) coding, the first in the literature. The channel dispersion expressions are then used to compare the levels of error protection between RLSCs and MDS block codes. The results show that if and only if the target error probability pe is smaller than a threshold (≈0.1774), RLSCs offer strictly stronger error protection than MDS block codes, which is on top of the already significant 50% latency savings of RLSCs that eliminate the queueing delay completely.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Protecting Semantic Information Using An Efficient Secret Key 使用有效的密钥保护语义信息
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834462
Tao Guo, Jie Han, Huihui Wu, Yizhu Wang, Bo Bai, Wei Han
We consider a semantic cipher system, in which we protect only the semantic information of the source. The optimal tradeoff is characterized among the coding rate, the secret key rate, the semantic information leakage rate, the source reconstruction distortion, and the semantic distortion. It is shown that an efficient key with a small size suffices to protect the semantic information.
我们考虑一个语义密码系统,在这个系统中我们只保护源的语义信息。在编码率、密钥率、语义信息泄漏率、信源重构失真和语义失真之间进行了最优权衡。结果表明,一个小尺寸的高效密钥足以保护语义信息。
{"title":"Protecting Semantic Information Using An Efficient Secret Key","authors":"Tao Guo, Jie Han, Huihui Wu, Yizhu Wang, Bo Bai, Wei Han","doi":"10.1109/ISIT50566.2022.9834462","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834462","url":null,"abstract":"We consider a semantic cipher system, in which we protect only the semantic information of the source. The optimal tradeoff is characterized among the coding rate, the secret key rate, the semantic information leakage rate, the source reconstruction distortion, and the semantic distortion. It is shown that an efficient key with a small size suffices to protect the semantic information.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130556187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constrained Obfuscation to Thwart Pattern Matching Attacks 约束混淆阻止模式匹配攻击
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834792
S. Enayati, D. Goeckel, A. Houmansadr, H. Pishro-Nik
Recently, we have proposed a model-free privacy-preserving mechanism (PPM) against attacks that compromise user privacy by matching patterns in data sequences to those that are unique to a given user [1]. Because the PPM is model-free, there are no requirements on the statistical model for the data, which is desirable when the model is not perfectly known. However, the proposed PPM did not enforce any constraints on the value to which a data point might be obfuscated, hence allowing an unlikely pattern that would make it easy for the adversary to detect which values have been obfuscated. In this paper, we consider a constrained PPM that enforces a continuity constraint so as to avoid abrupt jumps in the obfuscated data. To design such, we employ a graph-based analytical framework and the concept of consecutive patterns. At each point, the obfuscated data should be chosen strictly from that point’s neighbors. Unfortunately, this might undesirably increase the noise level employed in data obfuscation and hence unacceptably reduce utility. We propose a new obfuscation algorithm, namely the obfuscation-return algorithm, and characterize its privacy guarantees under continuity and noise level constraints.
最近,我们提出了一种无模型隐私保护机制(PPM),通过将数据序列中的模式与给定用户的唯一模式相匹配,来防止损害用户隐私的攻击[1]。因为PPM是无模型的,所以对数据的统计模型没有要求,当模型不是完全已知时,这是理想的。然而,建议的PPM没有对数据点可能被混淆的值实施任何约束,因此允许一种不太可能的模式,使攻击者很容易检测到哪些值被混淆了。在本文中,我们考虑了一个约束的PPM,它强制执行连续性约束,以避免混淆数据中的突然跳跃。为了设计这样,我们采用了基于图形的分析框架和连续模式的概念。在每个点上,应该严格地从该点的邻近点中选择混淆的数据。不幸的是,这可能会增加在数据混淆中使用的噪声水平,从而降低了不可接受的效用。我们提出了一种新的混淆算法,即混淆-返回算法,并对其在连续性和噪声水平约束下的隐私保证进行了表征。
{"title":"Constrained Obfuscation to Thwart Pattern Matching Attacks","authors":"S. Enayati, D. Goeckel, A. Houmansadr, H. Pishro-Nik","doi":"10.1109/ISIT50566.2022.9834792","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834792","url":null,"abstract":"Recently, we have proposed a model-free privacy-preserving mechanism (PPM) against attacks that compromise user privacy by matching patterns in data sequences to those that are unique to a given user [1]. Because the PPM is model-free, there are no requirements on the statistical model for the data, which is desirable when the model is not perfectly known. However, the proposed PPM did not enforce any constraints on the value to which a data point might be obfuscated, hence allowing an unlikely pattern that would make it easy for the adversary to detect which values have been obfuscated. In this paper, we consider a constrained PPM that enforces a continuity constraint so as to avoid abrupt jumps in the obfuscated data. To design such, we employ a graph-based analytical framework and the concept of consecutive patterns. At each point, the obfuscated data should be chosen strictly from that point’s neighbors. Unfortunately, this might undesirably increase the noise level employed in data obfuscation and hence unacceptably reduce utility. We propose a new obfuscation algorithm, namely the obfuscation-return algorithm, and characterize its privacy guarantees under continuity and noise level constraints.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-user Privacy Cooperation Game by Leveraging Users’ Service Flexibility 利用用户服务灵活性的多用户隐私合作博弈
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834703
Shu Hong, Lingjie Duan
In location-based services (LBSs), it is promising for multiple users to cache and share their Point-of-Interest (PoI) information with each other to reduce overall query frequency and preserve location privacy. Yet most studies on multi-user privacy preservation overlook the opportunity of leveraging service flexibility, where many users are flexible and may add obfuscation to individual LBS query. This paper is the first to study how multiple users cooperate to query with obfuscation against the adversary’s optimal inference attack, by leveraging their mutual service flexibility. Unlike the literature, even if a user already finds the shared PoI information useful, we prove it beneficial for him to further query with obfuscated location to confuse the adversary. To save the computational complexity of the max-min adversarial game problem and derive the closed-form solution, we also propose a binary approximate solution, which is proved to guarantee good privacy performance for an average user. Perhaps surprisingly, the user with greater service flexibility should choose to query the LBS with less misreported location, to maximally confuse the adversary. Finally, we numerically compare our optimal and approximate solutions with the existing approaches to show our effective privacy improvement.
在基于位置的服务(lbs)中,多个用户可以缓存并彼此共享他们的兴趣点(PoI)信息,以减少总体查询频率并保护位置隐私。然而,大多数关于多用户隐私保护的研究都忽略了利用服务灵活性的机会,因为许多用户都是灵活的,可能会给单个LBS查询增加混淆。本文首次研究了多用户如何利用其相互服务的灵活性,合作进行带有混淆的查询来对抗对手的最优推理攻击。与文献不同的是,即使用户已经发现共享的PoI信息很有用,我们也证明了使用模糊位置进行进一步查询以迷惑对手是有益的。为了节省最大最小对抗博弈问题的计算复杂度并推导出封闭形式的解,我们还提出了一个二进制近似解,并证明了该近似解可以保证普通用户的良好隐私性能。也许令人惊讶的是,具有更大服务灵活性的用户应该选择查询具有较少错误报告位置的LBS,以最大限度地迷惑对手。最后,我们将我们的最优解和近似解与现有方法进行数值比较,以表明我们有效地改善了隐私。
{"title":"Multi-user Privacy Cooperation Game by Leveraging Users’ Service Flexibility","authors":"Shu Hong, Lingjie Duan","doi":"10.1109/ISIT50566.2022.9834703","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834703","url":null,"abstract":"In location-based services (LBSs), it is promising for multiple users to cache and share their Point-of-Interest (PoI) information with each other to reduce overall query frequency and preserve location privacy. Yet most studies on multi-user privacy preservation overlook the opportunity of leveraging service flexibility, where many users are flexible and may add obfuscation to individual LBS query. This paper is the first to study how multiple users cooperate to query with obfuscation against the adversary’s optimal inference attack, by leveraging their mutual service flexibility. Unlike the literature, even if a user already finds the shared PoI information useful, we prove it beneficial for him to further query with obfuscated location to confuse the adversary. To save the computational complexity of the max-min adversarial game problem and derive the closed-form solution, we also propose a binary approximate solution, which is proved to guarantee good privacy performance for an average user. Perhaps surprisingly, the user with greater service flexibility should choose to query the LBS with less misreported location, to maximally confuse the adversary. Finally, we numerically compare our optimal and approximate solutions with the existing approaches to show our effective privacy improvement.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bounding quantum capacities via partial orders and complementarity 通过偏序和互补性约束量子容量
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834698
C. Hirche, Felix Leditzky
Quantum capacities are fundamental quantities that are notoriously hard to compute and can exhibit surprising properties such as superadditivity. Thus a vast amount of literature is devoted to finding close and computable bounds on these capacities. We add a new viewpoint by giving operationally motivated bounds on several capacities, including the quantum capacity and private capacity of a channel and the one-way distillable entanglement and private key of a bipartite state. Our bounds themselves are generally given by certain capacities of the complementary channel or state. As a tool to obtain these bounds we discuss partial orders on quantum channels, such as the less noisy and the more capable order. Our bounds help to further understand the interplay between different capacities and give operational limitations on superadditivity properties and the difference between capacities. They can also be used as a new approach towards numerically bounding capacities, as discussed with some examples.
量子容量是出了名的难以计算的基本量,并且可以表现出惊人的特性,比如超可加性。因此,大量的文献致力于寻找这些能力的密切和可计算的界限。我们通过对信道的量子容量和私有容量以及双部态的单向可蒸馏纠缠和私钥等容量给出操作激励边界,增加了一个新的观点。我们的边界本身通常是由互补通道或状态的某些容量给出的。作为一种获得这些边界的工具,我们讨论了量子信道上的偏阶,例如噪声较小的阶和能力较强的阶。我们的界有助于进一步理解不同容量之间的相互作用,并给出超可加性性质的运算限制和容量之间的差异。它们也可以用作实现数值边界能力的新方法,如一些示例所讨论的那样。
{"title":"Bounding quantum capacities via partial orders and complementarity","authors":"C. Hirche, Felix Leditzky","doi":"10.1109/ISIT50566.2022.9834698","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834698","url":null,"abstract":"Quantum capacities are fundamental quantities that are notoriously hard to compute and can exhibit surprising properties such as superadditivity. Thus a vast amount of literature is devoted to finding close and computable bounds on these capacities. We add a new viewpoint by giving operationally motivated bounds on several capacities, including the quantum capacity and private capacity of a channel and the one-way distillable entanglement and private key of a bipartite state. Our bounds themselves are generally given by certain capacities of the complementary channel or state. As a tool to obtain these bounds we discuss partial orders on quantum channels, such as the less noisy and the more capable order. Our bounds help to further understand the interplay between different capacities and give operational limitations on superadditivity properties and the difference between capacities. They can also be used as a new approach towards numerically bounding capacities, as discussed with some examples.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121101396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A New Framework for Proving Coding Theorems for Linear Codes 一个证明线性码编码定理的新框架
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834426
Xiao Ma, Yixin Wang, Tingting Zhu
A new framework is presented in this paper for proving coding theorems for linear codes, where the systematic bits and the corresponding parity-check bits play different roles. Precisely, the noisy systematic bits are used to limit the list size of typical codewords, while the noisy parity-check bits are used to select from the list the maximum likelihood codeword. This new framework for linear codes allows that the systematic bits and the parity-check bits are transmitted in different ways and over different channels. In particular, this new framework unifies the source coding theorems and the channel coding theorems. With this framework, we prove that the Bernoulli generator matrix codes (BGMCs) are capacity-achieving over binary-input output symmetric (BIOS) channels and also entropy-achieving for Bernoulli sources.
本文提出了一个证明线性码的编码定理的新框架,其中系统位和相应的奇偶校验位扮演不同的角色。精确地说,系统噪声位用于限制典型码字列表的大小,而奇偶校验噪声位用于从列表中选择最大似然码字。这种线性码的新框架允许系统位和奇偶校验位以不同的方式通过不同的信道传输。特别地,这个新框架统一了源编码定理和信道编码定理。在此框架下,我们证明了伯努利生成器矩阵码(bgmc)在二进制输入输出对称(BIOS)信道上具有容量实现能力,并且对于伯努利源具有熵实现能力。
{"title":"A New Framework for Proving Coding Theorems for Linear Codes","authors":"Xiao Ma, Yixin Wang, Tingting Zhu","doi":"10.1109/ISIT50566.2022.9834426","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834426","url":null,"abstract":"A new framework is presented in this paper for proving coding theorems for linear codes, where the systematic bits and the corresponding parity-check bits play different roles. Precisely, the noisy systematic bits are used to limit the list size of typical codewords, while the noisy parity-check bits are used to select from the list the maximum likelihood codeword. This new framework for linear codes allows that the systematic bits and the parity-check bits are transmitted in different ways and over different channels. In particular, this new framework unifies the source coding theorems and the channel coding theorems. With this framework, we prove that the Bernoulli generator matrix codes (BGMCs) are capacity-achieving over binary-input output symmetric (BIOS) channels and also entropy-achieving for Bernoulli sources.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121138577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting 信息论环境下的不规则重复开槽ALOHA
Pub Date : 2022-06-26 DOI: 10.48550/arXiv.2207.06495
E. Paolini, Lorenzo Valentini, V. Tralli, M. Chiani
An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establish a link with successive interference cancellation over the multi-packet reception channel. This perspective allows proving achievability and converse results for the average sum rate of IRSA multiple access schemes.
提出了一种不规则重复开槽ALOHA (IRSA)的信息论方法。与之前的研究相比,IRSA分析仅基于交通等典型碰撞模型的数量进行,新方法还捕获了更基本的数量。具体而言,针对加法器信道模型,采用合适的码本结构,在多包接收信道上建立具有逐次干扰消除的链路。从这个角度可以证明IRSA多址方案的平均和速率的可实现性和相反的结果。
{"title":"Irregular Repetition Slotted ALOHA in an Information-Theoretic Setting","authors":"E. Paolini, Lorenzo Valentini, V. Tralli, M. Chiani","doi":"10.48550/arXiv.2207.06495","DOIUrl":"https://doi.org/10.48550/arXiv.2207.06495","url":null,"abstract":"An information-theoretic approach to irregular repetition slotted ALOHA (IRSA) is proposed. In contrast with previous works, in which IRSA analysis is conducted only based on quantities that are typical of collision models such as the traffic, the new approach also captures more fundamental quantities. Specifically, a suitable codebook construction for the adder channel model is adopted to establish a link with successive interference cancellation over the multi-packet reception channel. This perspective allows proving achievability and converse results for the average sum rate of IRSA multiple access schemes.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint Coding for Discrete Sources and Finite-State Noiseless Channels 离散源和有限状态无噪声信道的联合编码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834437
K. Iwata, Hirosuke Yamamoto
We propose a joint coding scheme using multiple code tables to efficiently transmit a sequence of messages of a discrete memoryless source (DMS) through a finite-state noiseless channel with unequal costs of code letters, which includes a noiseless (d, k)-constrained channel as a particular case. This paper presents a methodology for code design based on two methods. The first method, integer programming, is used to optimize a prefix-free code at each channel state when codeword costs are unequal and vary with each state. The second method is an iterative optimization that minimizes the average cost of the joint coding scheme using multiple code tables. The proposed coding scheme achieves the optimal average cost in the class of joint coding schemes using multiple code tables of prefix-free codes for a given pair of DMS and finite-state channel.
我们提出了一种使用多个码表的联合编码方案,通过具有不等码字母代价的有限状态无噪声信道有效地传输离散无记忆源(DMS)的消息序列,其中包括作为特殊情况的无噪声(d, k)约束信道。本文提出了一种基于两种方法的代码设计方法。第一种方法是整数规划,用于在码字代价不相等且随状态变化的情况下,对每个信道状态下的无前缀码进行优化。第二种方法是迭代优化,使用多个码表最小化联合编码方案的平均成本。对于给定的DMS对和有限状态信道,所提出的编码方案在使用多个无前缀码表的联合编码方案中实现了最优的平均开销。
{"title":"Joint Coding for Discrete Sources and Finite-State Noiseless Channels","authors":"K. Iwata, Hirosuke Yamamoto","doi":"10.1109/ISIT50566.2022.9834437","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834437","url":null,"abstract":"We propose a joint coding scheme using multiple code tables to efficiently transmit a sequence of messages of a discrete memoryless source (DMS) through a finite-state noiseless channel with unequal costs of code letters, which includes a noiseless (d, k)-constrained channel as a particular case. This paper presents a methodology for code design based on two methods. The first method, integer programming, is used to optimize a prefix-free code at each channel state when codeword costs are unequal and vary with each state. The second method is an iterative optimization that minimizes the average cost of the joint coding scheme using multiple code tables. The proposed coding scheme achieves the optimal average cost in the class of joint coding schemes using multiple code tables of prefix-free codes for a given pair of DMS and finite-state channel.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121482838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On State-Dependent Streaming Erasure Codes over the Three-Node Relay Network 三节点中继网络中状态相关流纠删码的研究
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834704
G. Facenda, E. Domanovitz, M. Krishnan, A. Khisti, S. Fong, Wai-tian Tan, J. Apostolopoulos
This paper investigates low-latency adaptive streaming codes for a three-node relay network. A source node transmits a sequence of source packets (messages) to the destination through a relay node. We focus on a particular case where the link connecting the source and relay nodes is almost reliable, but the link connecting the relay to the destination is not. The relay node can observe the erasure pattern that has occurred in the transmission between the source node and itself and adapt its relaying strategy based on that observation. Every source packet must be perfectly recovered by the destination with a strict delay T, as long as the number of erasures in the relay-to-destination link lies below some design parameter. We then characterize capacity as a function of such design parameter. The achievability scheme employs two different relaying strategies, based on whether an erasure has or has not occurred in the link from source to relay. The converse is proven by analyzing a periodic erasure pattern and lower bounding the minimum redundancy across channel packets. We show that the achievable rate can be improved compared to non-adaptive schemes previously proposed, indicating that exploiting the knowledge of the erasure pattern by the relay node is essential in achieving capacity.
研究了三节点中继网络的低延迟自适应流码。源节点通过中继节点将源数据包(消息)序列发送到目的节点。我们将重点讨论一种特殊情况,即连接源节点和中继节点的链路几乎是可靠的,但连接中继节点到目标节点的链路却不是可靠的。中继节点可以观察源节点与自身之间的传输中已经发生的擦除模式,并根据该观察调整其中继策略。只要中继到目的链路中的擦除次数低于某个设计参数,每个源数据包必须在严格的延迟T下被目的地完全恢复。然后,我们将容量描述为这种设计参数的函数。可实现性方案采用两种不同的中继策略,基于从源到中继的链路中是否发生擦除。通过分析周期性擦除模式和降低跨信道数据包的最小冗余的下限,证明了相反的情况。我们表明,与先前提出的非自适应方案相比,可实现的速率可以提高,这表明利用中继节点的擦除模式知识对于实现容量至关重要。
{"title":"On State-Dependent Streaming Erasure Codes over the Three-Node Relay Network","authors":"G. Facenda, E. Domanovitz, M. Krishnan, A. Khisti, S. Fong, Wai-tian Tan, J. Apostolopoulos","doi":"10.1109/ISIT50566.2022.9834704","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834704","url":null,"abstract":"This paper investigates low-latency adaptive streaming codes for a three-node relay network. A source node transmits a sequence of source packets (messages) to the destination through a relay node. We focus on a particular case where the link connecting the source and relay nodes is almost reliable, but the link connecting the relay to the destination is not. The relay node can observe the erasure pattern that has occurred in the transmission between the source node and itself and adapt its relaying strategy based on that observation. Every source packet must be perfectly recovered by the destination with a strict delay T, as long as the number of erasures in the relay-to-destination link lies below some design parameter. We then characterize capacity as a function of such design parameter. The achievability scheme employs two different relaying strategies, based on whether an erasure has or has not occurred in the link from source to relay. The converse is proven by analyzing a periodic erasure pattern and lower bounding the minimum redundancy across channel packets. We show that the achievable rate can be improved compared to non-adaptive schemes previously proposed, indicating that exploiting the knowledge of the erasure pattern by the relay node is essential in achieving capacity.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127797623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance 跟踪距离下玻色子信道隐蔽容量的表征
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834394
Shi-Yuan Wang, T. Erdogan, M. Bloch
We characterize upper and lower bounds for the covert capacity of lossy thermal-noise bosonic channels when measuring covertness using fidelity and trace distance. Although we fall short of characterizing the exact covert capacity, we also provide bounds on the number of secret-key bits required to achieve covertness. The bounds are established by combining recent quantum information theory results in separable Hilbert spaces, including position based coding (Oskouei et al., arXiv: 1804.08144 [1]), convex splitting (Khatri et al., arXiv: 1910.03883 [2]), and perturbation theory (Grace and Guha, arXiv: 2106.05533 [3]).
在使用保真度和迹线距离测量有耗热噪声玻色子信道的隐蔽容量时,我们描述了隐蔽容量的上界和下界。虽然我们没有描述确切的隐蔽容量,但我们也提供了实现隐蔽所需的秘钥比特数的界限。结合最近的量子信息理论在可分离Hilbert空间中的结果,建立了边界,包括基于位置的编码(Oskouei等人,arXiv: 1804.08144[1]),凸分裂(Khatri等人,arXiv: 1910.03883[2])和微扰理论(Grace和Guha, arXiv: 2106.05533[3])。
{"title":"Towards a Characterization of the Covert Capacity of Bosonic Channels under Trace Distance","authors":"Shi-Yuan Wang, T. Erdogan, M. Bloch","doi":"10.1109/ISIT50566.2022.9834394","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834394","url":null,"abstract":"We characterize upper and lower bounds for the covert capacity of lossy thermal-noise bosonic channels when measuring covertness using fidelity and trace distance. Although we fall short of characterizing the exact covert capacity, we also provide bounds on the number of secret-key bits required to achieve covertness. The bounds are established by combining recent quantum information theory results in separable Hilbert spaces, including position based coding (Oskouei et al., arXiv: 1804.08144 [1]), convex splitting (Khatri et al., arXiv: 1910.03883 [2]), and perturbation theory (Grace and Guha, arXiv: 2106.05533 [3]).","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"180 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127547838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1