-
arXiv:2401.16751 [pdf, ps, other]
Simultaneous Computation and Communication over MAC
Abstract: We study communication over a Gaussian multiple-access channel (MAC) with two types of transmitters: Digital transmitters hold a message from a discrete set that needs to be communicated to the receiver with vanishing error probability. Analog transmitters hold sequences of analog values, and some functions of these distributed values (but not the values themselves) need to be conveyed to the rece… ▽ More
Submitted 23 April, 2024; v1 submitted 30 January, 2024; originally announced January 2024.
-
arXiv:2205.09818 [pdf, ps, other]
A Learning-Based Approach to Approximate Coded Computation
Abstract: Lagrange coded computation (LCC) is essential to solving problems about matrix polynomials in a coded distributed fashion; nevertheless, it can only solve the problems that are representable as matrix polynomials. In this paper, we propose AICC, an AI-aided learning approach that is inspired by LCC but also uses deep neural networks (DNNs). It is appropriate for coded computation of more general f… ▽ More
Submitted 19 May, 2022; originally announced May 2022.
Comments: Submitted to IEEE Information Theory Workshop (ITW) 2022
-
Semantic Security with Infinite Dimensional Quantum Eavesdrop** Channel
Abstract: We propose a new proof method for direct coding theorems for wiretap channels where the eavesdropper has access to a quantum version of the transmitted signal on an infinite-dimensional Hilbert space and the legitimate parties communicate through a classical channel or a classical input, quantum output (cq) channel. The transmitter input can be subject to an additive cost constraint, which special… ▽ More
Submitted 5 June, 2023; v1 submitted 16 May, 2022; originally announced May 2022.
-
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
Abstract: The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open… ▽ More
Submitted 22 June, 2022; v1 submitted 26 April, 2022; originally announced April 2022.
Comments: Updates in Section III
-
arXiv:2203.04588 [pdf, ps, other]
Unsupervised Domain Adaptation across FMCW Radar Configurations Using Margin Disparity Discrepancy
Abstract: Commercial radar sensing is gaining relevance and machine learning algorithms constitute one of the key components that are enabling the spread of this radio technology into areas like surveillance or healthcare. However, radar datasets are still scarce and generalization cannot be yet achieved for all radar systems, environment conditions or design parameters. A certain degree of fine tuning is,… ▽ More
Submitted 7 June, 2022; v1 submitted 9 March, 2022; originally announced March 2022.
Comments: 5 pages, 2 figures, accepted as a conference paper for EUSIPCO 2022
-
arXiv:2101.04690 [pdf, ps, other]
Over-The-Air Computation in Correlated Channels
Abstract: This paper addresses the problem of Over-The-Air (OTA) computation in wireless networks which has the potential to realize huge efficiency gains for instance in training of distributed ML models. We provide non-asymptotic, theoretical guarantees for OTA computation in fast-fading wireless channels where the fading and noise may be correlated. The distributions of fading and noise are not restricte… ▽ More
Submitted 12 January, 2021; originally announced January 2021.
Comments: Extended version can be found at arXiv:2007.02648
Journal ref: 2020 IEEE Information Theory Workshop (ITW), Riva del Garda, Italy, 11-15 April, 2021
-
arXiv:2007.02648 [pdf, ps, other]
Over-The-Air Computation in Correlated Channels
Abstract: Over-the-Air (OTA) computation is the problem of computing functions of distributed data without transmitting the entirety of the data to a central point. By avoiding such costly transmissions, OTA computation schemes can achieve a better-than-linear (depending on the function, often logarithmic or even constant) scaling of the communication cost as the number of transmitters grows. Among the most… ▽ More
Submitted 17 August, 2021; v1 submitted 6 July, 2020; originally announced July 2020.
Journal ref: IEEE Transactions on Signal Processing, vol. 69, pp. 5739-5755, 2021
-
arXiv:2001.03174 [pdf, ps, other]
Towards Secure Over-The-Air Computation
Abstract: We propose a new method to protect Over-The-Air (OTA) computation schemes against passive eavesdrop**. Our method uses a friendly jammer whose signal is -- contrary to common intuition -- stronger at the legitimate receiver than it is at the eavesdropper. We focus on the computation of arithmetic averages over an OTA channel. The derived secrecy guarantee translates to a lower bound on the eaves… ▽ More
Submitted 15 March, 2024; v1 submitted 9 January, 2020; originally announced January 2020.
-
arXiv:1907.03777 [pdf, ps, other]
Distributed Approximation of Functions over Fast Fading Channels with Applications to Distributed Learning and the Max-Consensus Problem
Abstract: In this work, we consider the problem of distributed approximation of functions over multiple-access channels with additive noise. In contrast to previous works, we take fast fading into account and give explicit probability bounds for the approximation error allowing us to derive bounds on the number of channel uses that are needed to approximate a function up to a given approximation accuracy. N… ▽ More
Submitted 21 September, 2019; v1 submitted 8 July, 2019; originally announced July 2019.
Journal ref: 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, September 24-27, 2019, pp. 1146-1153
-
arXiv:1801.03964 [pdf, ps, other]
Resolvability on Continuous Alphabets
Abstract: We characterize the resolvability region for a large class of point-to-point channels with continuous alphabets. In our direct result, we prove not only the existence of good resolvability codebooks, but adapt an approach based on the Chernoff-Hoeffding bound to the continuous case showing that the probability of drawing an unsuitable codebook is doubly exponentially small. For the converse part,… ▽ More
Submitted 9 May, 2018; v1 submitted 11 January, 2018; originally announced January 2018.
Comments: v2: Corrected inaccuracies in proof of direct part. Statement of Theorem 3 slightly adapted; other results unchanged v3: Extended version of camera ready version submitted to ISIT 2018
Journal ref: 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 2018, pp. 2037-2041
-
arXiv:1710.02342 [pdf, ps, other]
The MAC Resolvability Region, Semantic Security and Its Operational Implications
Abstract: Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. In particular, we refine and extend the proof to obtain novel results on the second-order achievable rates. Then we characterize the resolvability region of the memoryless MAC by establishing a conceptually si… ▽ More
Submitted 22 January, 2018; v1 submitted 6 October, 2017; originally announced October 2017.
Comments: Substantially extended version of arXiv:1707.04156 v2: Restructured and in part rephrased to improve readability, removed typos, added some details and figures
-
arXiv:1707.04156 [pdf, ps, other]
MAC Resolvability: First And Second Order Results
Abstract: Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel from the perspective of resolvability. We then refine the approach in order to obtain some novel results on the second-order achievable rates.
Submitted 28 September, 2017; v1 submitted 13 July, 2017; originally announced July 2017.
Comments: Slightly extended version of the paper accepted at the 4th Workshop on Physical-Layer Methods for Wireless Security during IEEE CNS 2017. v2: Fixed typos and extended literature section in accordance with reviewers' recommendations
Journal ref: 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 2017, pp. 560-564
-
arXiv:1701.06354 [pdf, ps, other]
User Activity Detection via Group Testing and Coded Computation
Abstract: Inspired by group testing algorithms and the coded computation paradigm, we propose and analyze a novel multiple access scheme for detecting active users in large-scale networks. The scheme consists of a simple randomized detection algorithm that uses computation coding as intermediate steps for computing logical disjunction functions over the multiple access channel (MAC). First we show that give… ▽ More
Submitted 23 January, 2017; originally announced January 2017.
-
arXiv:1510.09091 [pdf, ps, other]
Strong Secrecy and Stealth for Broadcast Channels with Confidential Messages
Abstract: We consider a discrete memoryless broadcast channel consists of two users and a sender. The sender has two independent confidential messages for each user. We extend the work of Liu et al.\ on broadcast channels with two confidential messages with weak secrecy criterion to strong secrecy. Our results are based on an extension of the techniques developed by Hou and Kramer on bounding Kullback-Leibl… ▽ More
Submitted 1 February, 2016; v1 submitted 30 October, 2015; originally announced October 2015.
MSC Class: 94A15
-
arXiv:1209.6325 [pdf, ps, other]
Arbitrarily varying and compound classical-quantum channels and a note on quantum zero-error capacities
Abstract: We consider compound as well as arbitrarily varying classical-quantum channel models. For classical-quantum compound channels, we give an elementary proof of the direct part of the coding theorem. A weak converse under average error criterion to this statement is also established. We use this result together with the robustification and elimination technique developed by Ahlswede in order to give… ▽ More
Submitted 28 September, 2012; v1 submitted 27 September, 2012; originally announced September 2012.
Comments: 37 pages, 0 figures. Accepted for publication in the LNCS Volume in Memory of Rudolf Ahlswede. Includes a section on certain differences between classical and classical-quantum channels regarding their zero-error capacities
-
arXiv:1209.5213 [pdf, ps, other]
Capacity Results for Arbitrarily Varying Wiretap Channels
Abstract: In this work the arbitrarily varying wiretap channel AVWC is studied. We derive a lower bound on the random code secrecy capacity for the average error criterion and the strong secrecy criterion in the case of a best channel to the eavesdropper by using Ahlswede's robustification technique for ordinary AVCs. We show that in the case of a non-symmetrisable channel to the legitimate receiver the det… ▽ More
Submitted 24 September, 2012; originally announced September 2012.
Comments: 22 pages, 0 figures. Accepted for publication in the LNCS Volume in Memory of Rudolf Ahlswede. Some of the results were presented at the ITW 2012 Lausanne and published in the conference paper available at the IEEE Xplore
-
arXiv:1106.2850 [pdf, ps, other]
Universal quantum state merging
Abstract: We determine the optimal entanglement rate of quantum state merging when assuming that the state is unknown except for its membership in a certain set of states. We find that merging is possible at the lowest rate allowed by the individual states. Additionally, we establish a lower bound for the classical cost of state merging under state uncertainty. To this end we give an elementary proof for th… ▽ More
Submitted 26 February, 2013; v1 submitted 14 June, 2011; originally announced June 2011.
Comments: 35 pages, 0 figures, Accepted for publication in J. Math. Phys
Journal ref: J. Math. Phys. 54, 032204 (2013)
-
arXiv:1106.2013 [pdf, ps, other]
Secrecy Results for Compound Wiretap Channels
Abstract: We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a stronger secrecy criterion and the maximum error probability criteri… ▽ More
Submitted 25 November, 2012; v1 submitted 10 June, 2011; originally announced June 2011.
Comments: 25 pages, 1 figure. Accepted for publication in the journal "Problems of Information Transmission". Some of the results were presented at the ITW 2011 Paraty [arXiv:1103.0135] and published in the conference paper available at the IEEE Xplore
-
arXiv:1103.0135 [pdf, ps, other]
Capacity results for compound wiretap channels
Abstract: We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a quite strong secrecy criterion and with a decoder that is robust aga… ▽ More
Submitted 9 August, 2011; v1 submitted 1 March, 2011; originally announced March 2011.
Comments: 5 pages, no figures. Accepted for presentation at the IEEE ITW 2011
-
arXiv:1010.0418 [pdf, ps, other]
Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels
Abstract: We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a… ▽ More
Submitted 10 December, 2012; v1 submitted 3 October, 2010; originally announced October 2010.
Comments: 49 pages, no figures, final version of our papers arXiv:1010.0418v2 and arXiv:1010.0418. Published "Online First" in Communications in Mathematical Physics, 2012
Report number: Mittag-Leffler-2010fall
-
arXiv:1005.0291 [pdf, ps, other]
The Compound Multiple Access Channel with Partially Cooperating Encoders
Abstract: The goal of this paper is to provide a rigorous information-theoretic analysis of subnetworks of interference networks. We prove two coding theorems for the compound multiple-access channel with an arbitrary number of channel states. The channel state information at the transmitters is such that each transmitter has a finite partition of the set of states and knows which element of the partition t… ▽ More
Submitted 1 February, 2011; v1 submitted 3 May, 2010; originally announced May 2010.
Comments: accepted for publication in IEEE Transactions on Information Theory, Special Issue on Interference Networks
-
arXiv:1004.5551 [pdf, ps, other]
Entanglement Transmission over Arbitrarily Varying Quantum Channels
Abstract: We derive a regularized formula for the common randomness assisted entanglement transmission capacity of finite arbitrarily varying quantum channels (AVQC's). For finite AVQC's with positive capacity for classical message transmission we show, by derandomization through classical forward communication, that the random capacity for entanglement transmission equals the deterministic capacity for ent… ▽ More
Submitted 30 April, 2010; originally announced April 2010.
Comments: 6 pages, no figures. Accepted for presentation at the ISIT 2010 Austin, Texas. This is the conference version of a paper in preparation.
-
arXiv:0904.3011 [pdf, ps, other]
Entanglement Transmission Capacity of Compound Channels
Abstract: We determine the optimal achievable rate at which entanglement can be reliably transmitted when the memoryless channel used during transmission is unknown both to sender and receiver. To be more precise, we assume that both of them only know that the channel belongs to a given set of channels. Thus, they have to use encoding and decoding schemes that work well for the whole set.
Submitted 20 April, 2009; originally announced April 2009.
Comments: To appear in the proceedings of ISIT 2009
-
arXiv:0811.4588 [pdf, ps, other]
Entanglement transmission and generation under channel uncertainty: Universal quantum channel coding
Abstract: We determine the optimal rates of universal quantum codes for entanglement transmission and generation under channel uncertainty. In the simplest scenario the sender and receiver are provided merely with the information that the channel they use belongs to a given set of channels, so that they are forced to use quantum codes that are reliable for the whole set of channels. This is precisely the… ▽ More
Submitted 25 May, 2009; v1 submitted 27 November, 2008; originally announced November 2008.
Comments: 45 pages, no figures. Section 6.2 rewritten due to an error in equation (72) of the old version. Added table of contents, added section 'Conclusions and further remarks'. Accepted for publication in 'Communications in Mathematical Physics'
-
arXiv:0808.1007 [pdf, ps, other]
On Quantum Capacity of Compound Channels
Abstract: In this paper we address the issue of universal or robust communication over quantum channels. Specifically, we consider memoryless communication scenario with channel uncertainty which is an analog of compound channel in classical information theory. We determine the quantum capacity of finite compound channels and arbitrary compound channels with informed decoder. Our approach in the finite ca… ▽ More
Submitted 7 August, 2008; originally announced August 2008.
Comments: 16 pages, no figures
-
arXiv:0803.3773 [pdf, ps, other]
Capacity of Gaussian MIMO Bidirectional Broadcast Channels
Abstract: We consider the broadcast phase of a three-node network, where a relay node establishes a bidirectional communication between two nodes using a spectrally efficient two-phase decode-and-forward protocol. In the first phase the two nodes transmit their messages to the relay node. Then the relay node decodes the messages and broadcasts a re-encoded composition of them in the second phase. We consi… ▽ More
Submitted 30 April, 2008; v1 submitted 26 March, 2008; originally announced March 2008.
Comments: Proc. IEEE International Symposium on Information Theory (ISIT 2008), Toronto, Canada, July 2008
-
arXiv:0801.2034 [pdf, ps, other]
On the Boundedness of the Support of Optimal Input Measures for Rayleigh Fading Channels
Abstract: We consider transmission over a wireless multiple antenna communication system operating in a Rayleigh flat fading environment with no channel state information at the receiver and the transmitter with coherence time T=1. We show that, subject to the average power constraint, the support of the capacity achieving input distribution is bounded. Moreover, we show by a simple example concerning the… ▽ More
Submitted 14 January, 2008; originally announced January 2008.
Comments: 5 pages, submitted to ISIT 2008
-
arXiv:0710.3027 [pdf, ps, other]
Classical Capacities of Averaged and Compound Quantum Channels
Abstract: We determine the capacity of compound classical-quantum channels. As a consequence we obtain the capacity formula for the averaged classical-quantum channels. The capacity result for compound channels demonstrates, as in the classical setting, the existence of reliable universal classical-quantum codes in scenarios where the only a priori information about the channel used for the transmission o… ▽ More
Submitted 16 February, 2009; v1 submitted 16 October, 2007; originally announced October 2007.
Comments: 15 pages, no figures. Typos corrected. Remarks and suggestions of the referees incorporated. Submitted to IEEE Transactions on Information Theory
-
arXiv:math/0703772 [pdf, ps, other]
Typical support and Sanov large deviations of correlated states
Abstract: Discrete stationary classical processes as well as quantum lattice states are asymptotically confined to their respective typical support, the exponential growth rate of which is given by the (maximal ergodic) entropy. In the iid case the distinguishability of typical supports can be asymptotically specified by means of the relative entropy, according to Sanov's theorem. We give an extension to… ▽ More
Submitted 28 March, 2007; v1 submitted 27 March, 2007; originally announced March 2007.
Comments: 29 pages, no figures, references added
MSC Class: 60F10; 62G10; 94A15; 81S99
-
arXiv:cs/0703078 [pdf, ps, other]
Broadcast Capacity Region of Two-Phase Bidirectional Relaying
Abstract: In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario eac… ▽ More
Submitted 15 March, 2007; originally announced March 2007.
Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory
-
Ergodic Classical-Quantum Channels: Structure and Coding Theorems
Abstract: We consider ergodic causal classical-quantum channels (cq-channels) which additionally have a decaying input memory. In the first part we develop some structural properties of ergodic cq-channels and provide equivalent conditions for ergodicity. In the second part we prove the coding theorem with weak converse for causal ergodic cq-channels with decaying input memory. Our proof is based on the p… ▽ More
Submitted 16 February, 2009; v1 submitted 29 September, 2006; originally announced September 2006.
Comments: 19 pages, no figures. Final version
Journal ref: IEEE Transactions on Information Theory Vol. 54, No. 2, pp. 723-742, February 2008
-
arXiv:cs/0601107 [pdf, ps, other]
Structure of Optimal Input Covariance Matrices for MIMO Systems with Covariance Feedback under General Correlated Fading
Abstract: We describe the structure of optimal Input covariance matrices for single user multiple-input/multiple-output (MIMO) communication system with covariance feedback and for general correlated fading. Our approach is based on the novel concept of right commutant and recovers previously derived results for the Kronecker product models. Conditions are derived which allow a significant simplification… ▽ More
Submitted 29 September, 2006; v1 submitted 25 January, 2006; originally announced January 2006.
Comments: 5 pages, corrected typos
Journal ref: Proc. of the 2006 IEEE International Symposium on Information Theory, ISIT 2006 Seattle, pp. 1041-1045
-
A quantum version of Sanov's theorem
Abstract: We present a quantum extension of a version of Sanov's theorem focussing on a hypothesis testing aspect of the theorem: There exists a sequence of typical subspaces for a given set $Ψ$ of stationary quantum product states asymptotically separating them from another fixed stationary product state. Analogously to the classical case, the exponential separating rate is equal to the infimum of the qu… ▽ More
Submitted 20 December, 2004; originally announced December 2004.
Comments: 15 pages
-
Quantum Stein's lemma revisited, inequalities for quantum entropies, and a concavity theorem of Lieb
Abstract: We derive the monotonicity of the quantum relative entropy by an elementary operational argument based on Stein's lemma in quantum hypothesis testing. For the latter we present an elementary and short proof that requires the law of large numbers only. Joint convexity of the quantum relative entropy is proven too, resulting in a self-contained elementary version of Tropp's approach to Lieb's concav… ▽ More
Submitted 21 March, 2012; v1 submitted 24 July, 2003; originally announced July 2003.
Comments: 18 pages, no figures. Completely rewritten update of the paper: Title changed, the proofs are considerably simplified, joint convexity of the relative entropy is taken into account and a self-contained, operational approach to a recent proof by Tropp of one of Lieb's concavity results for trace functions is presented. Use of the Hiai/Petz-approximation of the quantum relative entropy is avoided
-
An Ergodic Theorem for the Quantum Relative Entropy
Abstract: We prove the ergodic version of the quantum Stein's lemma which was conjectured by Hiai and Petz. The result provides an operational and statistical interpretation of the quantum relative entropy as a statistical measure of distinguishability, and contains as a special case the quantum version of the Shannon-McMillan theorem for ergodic states. A version of the quantum relative Asymptotic Equipa… ▽ More
Submitted 13 June, 2003; originally announced June 2003.
Comments: 19 pages, no figures
-
Chained Typical Subspaces - a Quantum Version of Breiman's Theorem
Abstract: We give an equivalent finitary reformulation of the classical Shannon-McMillan-Breiman theorem which has an immediate translation to the case of ergodic quantum lattice systems. This version of a quantum Breiman theorem can be derived from the proof of the quantum Shannon-McMillan theorem presented in our previous work (math.DS/0207121).
Submitted 1 February, 2003; v1 submitted 31 January, 2003; originally announced January 2003.
Comments: 9 pages
-
The Data Compression Theorem for Ergodic Quantum Information Sources
Abstract: We extend the data compression theorem to the case of ergodic quantum information sources. Moreover, we provide an asymptotically optimal compression scheme which is based on the concept of high probability subspaces. The rate of this compression scheme is equal to the von Neumann entropy rate.
Submitted 10 January, 2003; originally announced January 2003.
Comments: 14 pages
-
arXiv:math/0207121 [pdf, ps, other]
The Shannon-McMillan Theorem for Ergodic Quantum Lattice Systems
Abstract: We formulate and prove a quantum Shannon-McMillan theorem. The theorem demonstrates the significance of the von Neumann entropy for translation invariant ergodic quantum spin systems on n-dimensional lattices: the entropy gives the logarithm of the essential number of eigenvectors of the system on large boxes. The one-dimensional case covers quantum information sources and is basic for coding th… ▽ More
Submitted 20 November, 2002; v1 submitted 15 July, 2002; originally announced July 2002.
Comments: 21 pages, extended version concerning subalgebras
MSC Class: 46L89; 68P30; 81Qxx