-
Converse Techniques for Identification via Channels
Authors:
Larissa Brüche,
Marcel A. Mross,
Yaning Zhao,
Wafa Labidi,
Christian Deppe,
Eduard A. Jorswieck
Abstract:
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from a set of $M$ messages, message identification focu…
▽ More
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from a set of $M$ messages, message identification focuses solely on discerning whether a specific message $m$ was transmitted. The encoder can operate deterministically or through randomization, with substantial advantages observed particularly in the latter approach. While Shannon's model allows transmission of $M = 2^{nC}$ messages, Ahlswede and Dueck's model facilitates the identification of $M = 2^{2^{nC}}$ messages, exhibiting a double exponential growth in block length. In their seminal paper, Ahlswede and Dueck established the achievability and introduced a "soft" converse bound. Subsequent works have further refined this, culminating in a strong converse bound, applicable under specific conditions. Watanabe's contributions have notably enhanced the applicability of the converse bound. The aim of this survey is multifaceted: to grasp the formalism and proof techniques outlined in the aforementioned works, analyze Watanabe's converse, trace the evolution from earlier converses to Watanabe's, emphasizing key similarities and differences that underpin the enhancements. Furthermore, we explore the converse proof for message identification with feedback, also pioneered by Ahlswede and Dueck. By elucidating how their approaches were inspired by preceding proofs, we provide a comprehensive overview. This overview paper seeks to offer readers insights into diverse converse techniques for message identification, with a focal point on the seminal works of Hayashi, Watanabe, and, in the context of feedback, Ahlswede and Dueck.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Entanglement-assisted authenticated BB84 protocol
Authors:
Pol Julià Farré,
Vladlen Galetsky,
Soham Ghosh,
Janis Nötzel,
Christian Deppe
Abstract:
This work delivers a novel user-server authentication procedure exploiting the features of maximally entangled pairs in both an idealistic noiseless scenario and a moderately noisy one. Additionally, we leverage the specific features of our design, which are conveniently suited for inlaying it into the well known BB84 quantum communication protocol. We first define a trivial extension of our initi…
▽ More
This work delivers a novel user-server authentication procedure exploiting the features of maximally entangled pairs in both an idealistic noiseless scenario and a moderately noisy one. Additionally, we leverage the specific features of our design, which are conveniently suited for inlaying it into the well known BB84 quantum communication protocol. We first define a trivial extension of our initial proposal allowing for such task (symmetric scheme) to then come up with what we denote as asymmetric scheme, better matching practicality.
Furthermore, a realistic simulation of the user-server authentication protocol has been achieved by employing a noisy model for both transmission and storage, the latter relying on cavity-enhanced atomic-frequency comb (AFC) memories. While in a noiseless scenario our proposal is ensured to be airtight, considering a certain degree of noise poses a challenge when aiming to actually implement it. We have implemented a deep neural network to distinguish legitimate users from forgery attempts, outperforming a mere statistical approach designed for the same task. Such method achieved a success rate of 0.75 with storage times of $1$ $μs$ and a user-server distance of $10$ km.
△ Less
Submitted 3 July, 2024;
originally announced July 2024.
-
Common Randomness Generation from Sources with Infinite Polish Alphabet
Authors:
Wafa Labidi,
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We investigate the problem of common randomness (CR) generation in the basic two-party communication setting in which a sender and a receiver aim to agree on a common random variable with high probability. The terminals observe independent and identically distributed (i.i.d.) samples of sources with an arbitrary distribution defined on a Polish alphabet and are allowed to communicate as little as…
▽ More
We investigate the problem of common randomness (CR) generation in the basic two-party communication setting in which a sender and a receiver aim to agree on a common random variable with high probability. The terminals observe independent and identically distributed (i.i.d.) samples of sources with an arbitrary distribution defined on a Polish alphabet and are allowed to communicate as little as possible over a noisy, memoryless channel. We establish single-letter upper and lower bounds on the CR capacity for the specified model. The derived bounds hold with equality except for at most countably many points where discontinuity issues might arise.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Optimal depth and a novel approach to variational quantum process tomography
Authors:
Vladlen Galetsky,
Pol Julià Farré,
Soham Ghosh,
Christian Deppe,
Roberto Ferrara
Abstract:
In this work, we present two new methods for Variational Quantum Circuit (VQC) Process Tomography onto $n$ qubits systems: PT_VQC and U-VQSVD.
Compared to the state of the art, PT_VQC halves in each run the required amount of qubits for process tomography and decreases the required state initializations from $4^{n}$ to just $2^{n}$, all while ensuring high-fidelity reconstruction of the targeted…
▽ More
In this work, we present two new methods for Variational Quantum Circuit (VQC) Process Tomography onto $n$ qubits systems: PT_VQC and U-VQSVD.
Compared to the state of the art, PT_VQC halves in each run the required amount of qubits for process tomography and decreases the required state initializations from $4^{n}$ to just $2^{n}$, all while ensuring high-fidelity reconstruction of the targeted unitary channel $U$. It is worth noting that, for a fixed reconstruction accuracy, PT_VQC achieves faster convergence per iteration step compared to Quantum Deep Neural Network (QDNN) and tensor network schemes.
The novel U-VQSVD algorithm utilizes variational singular value decomposition to extract eigenvectors (up to a global phase) and their associated eigenvalues from an unknown unitary representing a general channel. We assess the performance of U-VQSVD by executing an attack on a non-unitary channel Quantum Physical Unclonable Function (QPUF). U-VQSVD outperforms an uninformed impersonation attack (using randomly generated input states) by a factor of 2 to 5, depending on the qubit dimension.
For the two presented methods, we propose a new approach to calculate the complexity of the displayed VQC, based on what we denote as optimal depth.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Function Computation and Identification over Locally Homomorphic Multiple-Access Channels
Authors:
Johannes Rosenberger,
Holger Boche,
Juan A. Cabrera,
Christian Deppe
Abstract:
We develop the notion of a locally homomorphic channel and prove an approximate equivalence between those and codes for computing functions. Further, we derive decomposition properties of locally homomorphic channels which we use to analyze and construct codes where two messages must be encoded independently. This leads to new results for identification and K-identification when all messages are s…
▽ More
We develop the notion of a locally homomorphic channel and prove an approximate equivalence between those and codes for computing functions. Further, we derive decomposition properties of locally homomorphic channels which we use to analyze and construct codes where two messages must be encoded independently. This leads to new results for identification and K-identification when all messages are sent over multiple-access channels, which yield surprising rate improvements compared to naive code constructions. In particular, we demonstrate that for the example of identification with deterministic encoders, both encoders can be constructed independently.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Existential Unforgeability in Quantum Authentication From Quantum Physical Unclonable Functions Based on Random von Neumann Measurement
Authors:
Soham Ghosh,
Vladlen Galetsky,
Pol Julià Farré,
Christian Deppe,
Roberto Ferrara,
Holger Boche
Abstract:
Physical Unclonable Functions (PUFs) are hardware devices with the assumption of possessing inherent non-clonable physical randomness which leads to unique pairs of inputs and outputs that provide a secure fingerprint for cryptographic protocols like authentication. In the case of quantum PUFs (QPUFs), the input-output pairs consist of quantum states instead of classical bitstrings, offering advan…
▽ More
Physical Unclonable Functions (PUFs) are hardware devices with the assumption of possessing inherent non-clonable physical randomness which leads to unique pairs of inputs and outputs that provide a secure fingerprint for cryptographic protocols like authentication. In the case of quantum PUFs (QPUFs), the input-output pairs consist of quantum states instead of classical bitstrings, offering advantages over classical PUFs (CPUFs) such as challenge reusability via public channels and non-reliance over any trusted party due to the no-cloning theorem. In recent literature, a generalized mathematical framework for studying QPUFs was developed, which paved the way for having QPUF models with provable security. It was proved that \emph{existential unforgeability} against Quantum Polynomial Time (QPT) adversaries cannot be achieved by any random unitary QPUF. Since measurements are non-unitary quantum processes, we define a QPUF based on random von Neumann measurements. We prove that such a QPUF is existentially unforgeable. Thus, we introduce the first model in existing literature that depicts such a high level of provable security. We also prove that the Quantum Phase Estimation (QPE) protocol applied on a Haar random unitary serves as an approximate implementation for this kind of QPUF as it approximates a von Neumann measurement on the eigenbasis of the unitary.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Deterministic Identification Codes for Fading Channels
Authors:
Ilya Vorobyev,
Christian Deppe,
Holger Boche
Abstract:
Many communication applications incorporate event-triggered behavior, where the conventional Shannon capacity may not effectively gauge performance. Consequently, we advocate for the concept of identification capacity as a more suitable metric for assessing these systems. We consider deterministic identification codes for the Gaussian AWGN, the slow fading, and the fast fading channels with power…
▽ More
Many communication applications incorporate event-triggered behavior, where the conventional Shannon capacity may not effectively gauge performance. Consequently, we advocate for the concept of identification capacity as a more suitable metric for assessing these systems. We consider deterministic identification codes for the Gaussian AWGN, the slow fading, and the fast fading channels with power constraints. We prove lower bounds on capacities for the slow and the fast fading channels with side information for a wide range of fading distributions. Additionally, we present the code construction with efficient encoding which achieves the lower bound on capacity both for the slow and the fast fading channels. At last, we prove the same lower bound on the capacity of the fast fading channel without side information, i.e. the same lower bound holds even when the receiver doesn't know the fading coefficients. As a result we show that compared with Shannon's message transmission paradigm we achieved completely different capacity scaling for deterministic identification codes for all relevant fading channels.
△ Less
Submitted 8 May, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Deterministic identification over channels with finite output: a dimensional perspective on superlinear rates
Authors:
Pau Colomer,
Christian Deppe,
Holger Boche,
Andreas Winter
Abstract:
Following initial work by JaJa and Ahlswede/Cai, and inspired by a recent renewed surge in interest in deterministic identification via noisy channels, we consider the problem in its generality for memoryless channels with finite output, but arbitrary input alphabets.
Such a channel is essentially given by (the closure of) the subset of its output distributions in the probability simplex. Our ma…
▽ More
Following initial work by JaJa and Ahlswede/Cai, and inspired by a recent renewed surge in interest in deterministic identification via noisy channels, we consider the problem in its generality for memoryless channels with finite output, but arbitrary input alphabets.
Such a channel is essentially given by (the closure of) the subset of its output distributions in the probability simplex. Our main findings are that the maximum number of messages thus identifiable scales super-exponentially as $2^{R\,n\log n}$ with the block length $n$, and that the optimal rate $R$ is upper and lower bounded in terms of the covering (aka Minkowski, or Kolmogorov, or entropy) dimension $d$ of the output set: $\frac14 d \leq R \leq d$. Leading up to the general case, we treat the important special case of the so-called Bernoulli channel with input alphabet $[0;1]$ and binary output, which has $d=1$, to gain intuition. Along the way, we show a certain Hypothesis Testing Lemma (generalising an earlier insight of Ahlswede regarding the intersection of typical sets) that implies that for the construction of a deterministic identification code, it is sufficient to ensure pairwise reliable distinguishability of the output distributions.
These results are then shown to generalise directly to classical-quantum channels with finite-dimensional output quantum system (but arbitrary input alphabet), and in particular to quantum channels on finite-dimensional quantum systems under the constraint that the identification code can only use tensor product inputs.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Zero-entropy encoders and simultaneous decoders in identification via quantum channels
Authors:
Pau Colomer,
Christian Deppe,
Holger Boche,
Andreas Winter
Abstract:
Motivated by deterministic identification via (classical) channels, where the encoder is not allowed to use randomization, we revisit the problem of identification via quantum channels but now with the additional restriction that the message encoding must use pure quantum states, rather than general mixed states. Together with the previously considered distinction between simultaneous and general…
▽ More
Motivated by deterministic identification via (classical) channels, where the encoder is not allowed to use randomization, we revisit the problem of identification via quantum channels but now with the additional restriction that the message encoding must use pure quantum states, rather than general mixed states. Together with the previously considered distinction between simultaneous and general decoders, this suggests a two-dimensional spectrum of different identification capacities, whose behaviour could a priori be very different.
We demonstrate two new results as our main findings: first, we show that all four combinations (pure/mixed encoder, simultaneous/general decoder) have a double-exponentially growing code size, and that indeed the corresponding identification capacities are lower bounded by the classical transmission capacity for a general quantum channel, which is given by the Holevo-Schumacher-Westmoreland Theorem. Secondly, we show that the simultaneous identification capacity of a quantum channel equals the simultaneous identification capacity with pure state encodings, thus leaving three linearly ordered identification capacities. By considering some simple examples, we finally show that these three are all different: general identification capacity can be larger than pure-state-encoded identification capacity, which in turn can be larger than pure-state-encoded simultaneous identification capacity.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Common Randomness Generation from Finite Compound Sources
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We investigate the problem of generating common randomness (CR) from finite compound sources aided by unidirectional communication over rate-limited perfect channels. The two communicating parties, often referred to as terminals, observe independent and identically distributed (i.i.d.) samples of a finite compound source and aim to agree on a common random variable with a high probability for ever…
▽ More
We investigate the problem of generating common randomness (CR) from finite compound sources aided by unidirectional communication over rate-limited perfect channels. The two communicating parties, often referred to as terminals, observe independent and identically distributed (i.i.d.) samples of a finite compound source and aim to agree on a common random variable with a high probability for every possible realization of the source state. Both parties know the set of source states as well as their statistics. However, they are unaware of the actual realization of the source state. We establish a single-letter lower and upper bound on the compound CR capacity for the specified model. Furthermore, we present two special scenarios where the established bounds coincide.
△ Less
Submitted 25 January, 2024;
originally announced January 2024.
-
Quantum optimization of coherent chaotic systems: A case for buses of Kathmandu
Authors:
Kiran Adhikari,
Aman Ganeju,
Iva Kumari Lamichhane,
Rohit Bhattarai,
Manghang Limbu,
Nishma Bhattarai,
Christian Deppe
Abstract:
In this paper, we propose a novel quantum computing approach to solve the real-world problem of optimizing transportation in bustling Kathmandu city. The transportation system in Kathmandu is chaotic, with no central authority controlling the transportation. We leverage this chaotic feature in our quantum optimization procedure. The quantum chaos theory's Wigner-Dyson distribution surfaced as the…
▽ More
In this paper, we propose a novel quantum computing approach to solve the real-world problem of optimizing transportation in bustling Kathmandu city. The transportation system in Kathmandu is chaotic, with no central authority controlling the transportation. We leverage this chaotic feature in our quantum optimization procedure. The quantum chaos theory's Wigner-Dyson distribution surfaced as the most effective bus spacing distribution for a bus driver to maximize their profit. We investigate the statistical properties of the buses with real-time GPS bus location data and optimize bus spacing and interval distribution around the 27 km circular ring road in Kathmandu. Using tools like quantum simulation, eigenvalue distributions, and output wave function analysis, we show that such optimal bus spacing distribution could be achieved.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
Identification Capacity of the Discrete-Time Poisson Channel
Authors:
Wafa Labidi,
Christian Deppe,
Holger Boche
Abstract:
Numerous applications in the field of molecular communications (MC) such as healthcare systems are often event-driven. The conventional Shannon capacity may not be the appropriate metric for assessing performance in such cases. We propose the identification (ID) capacity as an alternative metric. Particularly, we consider randomized identification (RI) over the discrete-time Poisson channel (DTPC)…
▽ More
Numerous applications in the field of molecular communications (MC) such as healthcare systems are often event-driven. The conventional Shannon capacity may not be the appropriate metric for assessing performance in such cases. We propose the identification (ID) capacity as an alternative metric. Particularly, we consider randomized identification (RI) over the discrete-time Poisson channel (DTPC), which is typically used as a model for MC systems that utilize molecule-counting receivers. In the ID paradigm, the receiver's focus is not on decoding the message sent. However, he wants to determine whether a message of particular significance to him has been sent or not. In contrast to Shannon transmission codes, the size of ID codes for a Discrete Memoryless Channel (DMC) grows doubly exponentially fast with the blocklength, if randomized encoding is used. In this paper, we derive the capacity formula for RI over the DTPC subject to some peak and average power constraints. Furthermore, we analyze the case of state-dependent DTPC.
△ Less
Submitted 29 January, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
Information-Theoretically Secret Reed-Muller Identification with Affine Designs
Authors:
Mattia Spandri,
Roberto Ferrara,
Christian Deppe,
Moritz Wiese,
Holger Boche
Abstract:
We consider the problem of information-theoretic secrecy in identification schemes rather than transmission schemes. In identification, large identities are encoded into small challenges sent with the sole goal of allowing at the receiver reliable verification of whether the challenge could have been generated by a (possibly different) identity of his choice. One of the reasons to consider identif…
▽ More
We consider the problem of information-theoretic secrecy in identification schemes rather than transmission schemes. In identification, large identities are encoded into small challenges sent with the sole goal of allowing at the receiver reliable verification of whether the challenge could have been generated by a (possibly different) identity of his choice. One of the reasons to consider identification is that it trades decoding for an exponentially larger rate, however this may come with such encoding complexity and latency that it can render this advantage unusable. Identification still bears one unique advantage over transmission in that practical implementation of information-theoretic secrecy becomes possible, even considering that the information-theoretic secrecy definition needed in identification is that of semantic secrecy. Here, we implement a family of encryption schemes, recently shown to achieve semantic-secrecy capacity, and apply it to a recently-studied family of identification codes, confirming that, indeed, adding secrecy to identification comes at essentially no cost. While this is still within the one-way communication scenario, it is a necessary step into implementing semantic secrecy with two-way communication, where the information-theoretic assumptions are more realistic.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Krylov Complexity of Fermionic and Bosonic Gaussian States
Authors:
Kiran Adhikari,
Adwait Rijal,
Ashok Kumar Aryal,
Mausam Ghimire,
Rajeev Singh,
Christian Deppe
Abstract:
The concept of \emph{complexity} has become pivotal in multiple disciplines, including quantum information, where it serves as an alternative metric for gauging the chaotic evolution of a quantum state. This paper focuses on \emph{Krylov complexity}, a specialized form of quantum complexity that offers an unambiguous and intrinsically meaningful assessment of the spread of a quantum state over all…
▽ More
The concept of \emph{complexity} has become pivotal in multiple disciplines, including quantum information, where it serves as an alternative metric for gauging the chaotic evolution of a quantum state. This paper focuses on \emph{Krylov complexity}, a specialized form of quantum complexity that offers an unambiguous and intrinsically meaningful assessment of the spread of a quantum state over all possible orthogonal bases. Our study is situated in the context of Gaussian quantum states, which are fundamental to both Bosonic and Fermionic systems and can be fully described by a covariance matrix. We show that while the covariance matrix is essential, it is insufficient alone for calculating Krylov complexity due to its lack of relative phase information. Our findings suggest that the relative covariance matrix can provide an upper bound for Krylov complexity for Gaussian quantum states. We also explore the implications of Krylov complexity for theories proposing complexity as a candidate for holographic duality by computing Krylov complexity for the thermofield double States (TFD) and Dirac field.
△ Less
Submitted 4 March, 2024; v1 submitted 19 September, 2023;
originally announced September 2023.
-
Quantum information spreading and scrambling in a distributed quantum network: A Hasse/Lamport diagrammatic approach
Authors:
Kiran Adhikari,
Christian Deppe
Abstract:
Large-scale quantum networks, known as quantum internet, hold great promises for advanced distributed quantum computing and long-distance quantum communication. It is essential to have a proper theoretical analysis of the quantum network and explore new applications and protocols that justify building such an extensive network. We propose a novel diagrammatic way of visualizing information flow dy…
▽ More
Large-scale quantum networks, known as quantum internet, hold great promises for advanced distributed quantum computing and long-distance quantum communication. It is essential to have a proper theoretical analysis of the quantum network and explore new applications and protocols that justify building such an extensive network. We propose a novel diagrammatic way of visualizing information flow dynamics within the quantum network, which preserves the causal relationship between different events at different nodes. This facilitates synchronization among network nodes, studies the error propagation, and allows for tracking valuable quantum resources. Additionally, We propose a quantum information scrambling protocol, where a specific node scrambles secret quantum information across the entire network. This protocol ensures that a malicious party would need access to a significant subset of the network to retrieve the information.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
A Review of the Applications of Quantum Machine Learning in Optical Communication Systems
Authors:
Ark Modi,
Alonso Viladomat Jasso,
Roberto Ferrara,
Christian Deppe,
Janis Noetzel,
Fred Fung,
Maximilian Schaedler
Abstract:
In the context of optical signal processing, quantum and quantum-inspired machine learning algorithms have massive potential for deployment. One of the applications is in error correction protocols for the received noisy signals. In some scenarios, non-linear and unknown errors can lead to noise that bypasses linear error correction protocols that optical receivers generally implement. In those ca…
▽ More
In the context of optical signal processing, quantum and quantum-inspired machine learning algorithms have massive potential for deployment. One of the applications is in error correction protocols for the received noisy signals. In some scenarios, non-linear and unknown errors can lead to noise that bypasses linear error correction protocols that optical receivers generally implement. In those cases, machine learning techniques are used to recover the transmitted signal from the received signal through various estimation procedures. Since quantum machine learning algorithms promise advantage over classical algorithms, we expect that optical signal processing can benefit from these advantages. In this review, we survey several proposed quantum and quantum-inspired machine learning algorithms and their applicability with current technology to optical signal processing.
△ Less
Submitted 25 September, 2023; v1 submitted 10 September, 2023;
originally announced September 2023.
-
Quantum and Quantum-Inspired Stereographic K Nearest-Neighbour Clustering
Authors:
Alonso Viladomat Jasso,
Ark Modi,
Roberto Ferrara,
Christian Deppe,
Janis Noetzel,
Fred Fung,
Maximilian Schaedler
Abstract:
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical-fibre communication systems. Quantum k-means clustering promises a speed-up over the classical k-means algorithm; however, it has been shown to not currently provide this speed-up for decoding optical-fibre signals due to the embedding of c…
▽ More
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical-fibre communication systems. Quantum k-means clustering promises a speed-up over the classical k-means algorithm; however, it has been shown to not currently provide this speed-up for decoding optical-fibre signals due to the embedding of classical data, which introduces inaccuracies and slowdowns. Although still not achieving an exponential speed-up for NISQ implementations, this work proposes the generalised inverse stereographic projection as an improved embedding into the Bloch sphere for quantum distance estimation in k-nearest-neighbour clustering, which allows us to get closer to the classical performance. We also use the generalised inverse stereographic projection to develop an analogous classical clustering algorithm and benchmark its accuracy, runtime and convergence for decoding real-world experimental optical-fibre communication data. This proposed 'quantum-inspired' algorithm provides an improvement in both the accuracy and convergence rate with respect to the k-means algorithm. Hence, this work presents two main contributions. Firstly, we propose the general inverse stereographic projection into the Bloch sphere as a better embedding for quantum machine learning algorithms; here, we use the problem of clustering quadrature amplitude modulated optical-fibre signals as an example. Secondly, as a purely classical contribution inspired by the first contribution, we propose and benchmark the use of the general inverse stereographic projection and spherical centroid for clustering optical-fibre signals, showing that optimizing the radius yields a consistent improvement in accuracy and convergence rate.
△ Less
Submitted 25 September, 2023; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Testing of Hybrid Quantum-Classical K-Means for Nonlinear Noise Mitigation
Authors:
Ark Modi,
Alonso Viladomat Jasso,
Roberto Ferrara,
Christian Deppe,
Janis Noetzel,
Fred Fung,
Maximilian Schaedler
Abstract:
Nearest-neighbour clustering is a powerful set of heuristic algorithms that find natural application in the decoding of signals transmitted using the M-Quadrature Amplitude Modulation (M-QAM) protocol. Lloyd et al. proposed a quantum version of the algorithm that promised an exponential speed-up. We analyse the performance of this algorithm by simulating the use of a hybrid quantum-classical imple…
▽ More
Nearest-neighbour clustering is a powerful set of heuristic algorithms that find natural application in the decoding of signals transmitted using the M-Quadrature Amplitude Modulation (M-QAM) protocol. Lloyd et al. proposed a quantum version of the algorithm that promised an exponential speed-up. We analyse the performance of this algorithm by simulating the use of a hybrid quantum-classical implementation of it upon 16-QAM and experimental 64-QAM data. We then benchmark the implementation against the classical k-means clustering algorithm. The choice of quantum encoding of the classical data plays a significant role in the performance, as it would for the hybrid quantum-classical implementation of any quantum machine learning algorithm. In this work, we use the popular angle embedding method for data embedding and the swap test for overlap estimation. The algorithm is emulated in software using Qiskit and tested on simulated and real-world experimental data. The discrepancy in accuracy from the perspective of the induced metric of the angle embedding method is discussed, and a thorough analysis regarding the angle embedding method in the context of distance estimation is provided. We detail an experimental optic fibre setup as well, from which we collect 64-QAM data. This is the dataset upon which the algorithms are benchmarked. Finally, some promising current and future directions for further research are discussed.
△ Less
Submitted 10 October, 2023; v1 submitted 7 August, 2023;
originally announced August 2023.
-
Capacity Bounds for Identification With Effective Secrecy
Authors:
Johannes Rosenberger,
Abdalla Ibrahim,
Boulat A. Bash,
Christian Deppe,
Roberto Ferrara,
Uzi Pereg
Abstract:
An upper bound to the identification capacity of discrete memoryless wiretap channels is derived under the requirement of semantic effective secrecy, combining semantic secrecy and stealth constraints. A previously established lower bound is improved by applying it to a prefix channel, formed by concatenating an auxiliary channel and the actual channel. The bounds are tight if the legitimate chann…
▽ More
An upper bound to the identification capacity of discrete memoryless wiretap channels is derived under the requirement of semantic effective secrecy, combining semantic secrecy and stealth constraints. A previously established lower bound is improved by applying it to a prefix channel, formed by concatenating an auxiliary channel and the actual channel. The bounds are tight if the legitimate channel is more capable than the eavesdropper's channel. An illustrative example is provided for a wiretap channel that is composed of a point-to-point channel, and a parallel, reversely degraded wiretap channel. A comparison with results for message transmission and for identification with only secrecy constraint is provided.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Deterministic Identification Over Multiple-Access Channels
Authors:
Johannes Rosenberger,
Abdalla Ibrahim,
Christian Deppe,
Roberto Ferrara
Abstract:
Deterministic identification over K-input multiple-access channels with average input cost constraints is considered. The capacity region for deterministic identification is determined for an average-error criterion, where arbitrarily large codes are achievable. For a maximal-error criterion, upper and lower bounds on the capacity region are derived. The bounds coincide if all average partial poin…
▽ More
Deterministic identification over K-input multiple-access channels with average input cost constraints is considered. The capacity region for deterministic identification is determined for an average-error criterion, where arbitrarily large codes are achievable. For a maximal-error criterion, upper and lower bounds on the capacity region are derived. The bounds coincide if all average partial point-to-point channels are injective under the input constraint, i.e. all inputs at one terminal are mapped to distinct output distributions, if averaged over the inputs at all other terminals. The achievability is proved by treating the MAC as an arbitrarily varying channel with average state constraints. For injective average channels, the capacity region is a hyperrectangle. The modulo-2 and modulo-3 binary adder MAC are presented as examples of channels which are injective under suitable input constraints. The binary multiplier MAC is presented as an example of a non-injective channel, where the achievable identification rate region still includes the Shannon capacity region.
△ Less
Submitted 20 June, 2023;
originally announced June 2023.
-
Joint Identification and Sensing for Discrete Memoryless Channels
Authors:
Wafa Labidi,
Christian Deppe,
Holger Boche
Abstract:
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver only checks whether a message of special interest to him has been sent or not. In contrast to Shannon transmission codes, the size of ID codes for a Discrete Memoryless Channel (DMC) grows doubly exponentially fast with the blocklength, if randomized encoding is used. This groundbreaking result makes the ID paradigm mor…
▽ More
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver only checks whether a message of special interest to him has been sent or not. In contrast to Shannon transmission codes, the size of ID codes for a Discrete Memoryless Channel (DMC) grows doubly exponentially fast with the blocklength, if randomized encoding is used. This groundbreaking result makes the ID paradigm more efficient than the classical Shannon transmission in terms of necessary energy and hardware components. Further gains can be achieved by taking advantage of additional resources such as feedback. We study the problem of joint ID and channel state estimation over a DMC with independent and identically distributed (i.i.d.) state sequences. The sender simultaneously sends an ID message over the DMC with a random state and estimates the channel state via a strictly causal channel output. The random channel state is available to neither the sender nor the receiver. For the proposed system model, we establish a lower bound on the ID capacity-distortion function.
△ Less
Submitted 11 May, 2023;
originally announced May 2023.
-
A Lower and Upper Bound on the Epsilon-Uniform Common Randomness Capacity
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We consider a standard two-source model for uniform common randomness (UCR) generation, in which Alice and Bob observe independent and identically distributed (i.i.d.) samples of a correlated finite source and where Alice is allowed to send information to Bob over an arbitrary single-user channel. We study the \(\boldsymbolε\)-UCR capacity for the proposed model, defined as the maximum common rand…
▽ More
We consider a standard two-source model for uniform common randomness (UCR) generation, in which Alice and Bob observe independent and identically distributed (i.i.d.) samples of a correlated finite source and where Alice is allowed to send information to Bob over an arbitrary single-user channel. We study the \(\boldsymbolε\)-UCR capacity for the proposed model, defined as the maximum common randomness rate one can achieve such that the probability that Alice and Bob do not agree on a common uniform or nearly uniform random variable does not exceed \(\boldsymbolε.\)
We establish a lower and an upper bound on the \(\boldsymbolε\)-UCR capacity using the bounds on the \(\boldsymbolε\)-transmission capacity proved by Verdú and Han for arbitrary point-to-point channels.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Deterministic K-Identification For Binary Symmetric Channel
Authors:
Ons Dabbabi,
Mohammad Javad Salariseddigh,
Christian Deppe,
Holger Boche
Abstract:
Deterministic K-Identification (DKI) for the binary symmetric channel (BSC) is developed. A full characterization of the DKI capacity for such a channel, with and without the Hamming weight constraint, is established. As a key finding, we find that for deterministic encoding the number of identifiable messages $K$ may grow exponentially with the codeword length $n$, i.e., $K = 2^{κn}$, where $κ$ i…
▽ More
Deterministic K-Identification (DKI) for the binary symmetric channel (BSC) is developed. A full characterization of the DKI capacity for such a channel, with and without the Hamming weight constraint, is established. As a key finding, we find that for deterministic encoding the number of identifiable messages $K$ may grow exponentially with the codeword length $n$, i.e., $K = 2^{κn}$, where $κ$ is the target identification rate. Furthermore, the eligible region for $κ$ as a function of the channel statistics, i.e., the crossover probability, is determined.
△ Less
Submitted 7 May, 2023;
originally announced May 2023.
-
Deterministic Identification For MC Binomial Channel
Authors:
Mohammad Javad Salariseddigh,
Vahid Jamali,
Holger Boche,
Christian Deppe,
Robert Schober
Abstract:
The Binomial channel serves as a fundamental model for molecular communication (MC) systems employing molecule-counting receivers. Here, deterministic identification (DI) is addressed for the discrete-time Binomial channels (DTBC), subject to an average and a peak constraint on the molecule release rate. We establish that the number of different messages that can be reliably identified for the DTB…
▽ More
The Binomial channel serves as a fundamental model for molecular communication (MC) systems employing molecule-counting receivers. Here, deterministic identification (DI) is addressed for the discrete-time Binomial channels (DTBC), subject to an average and a peak constraint on the molecule release rate. We establish that the number of different messages that can be reliably identified for the DTBC scales as $2^{(n\log n)R}$, where $n$ and $R$ are the codeword length and coding rate, respectively. Lower and upper bounds on the DI capacity of the DTBC are developed.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
The Multiple-Access Channel with Entangled Transmitters
Authors:
Uzi Pereg,
Christian Deppe,
Holger Boche
Abstract:
Communication over a classical multiple-access channel (MAC) with entanglement resources is considered, whereby two transmitters share entanglement resources a priori before communication begins. Leditzky et al. (2020) presented an example of a classical MAC, defined in terms of a pseudo telepathy game, such that the sum rate with entangled transmitters is strictly higher than the best achievable…
▽ More
Communication over a classical multiple-access channel (MAC) with entanglement resources is considered, whereby two transmitters share entanglement resources a priori before communication begins. Leditzky et al. (2020) presented an example of a classical MAC, defined in terms of a pseudo telepathy game, such that the sum rate with entangled transmitters is strictly higher than the best achievable sum rate without such resources. Here, we establish inner and outer bounds on the capacity region for the general MAC with entangled transmitters, and show that the previous result can be obtained as a special case. It has long been known that the capacity region of the classical MAC under a message-average error criterion can be strictly larger than with a maximal error criterion (Dueck, 1978). We observe that given entanglement resources, the regions coincide. Furthermore, we address the combined setting of entanglement resources and conferencing, where the transmitters can also communicate with each other over rate-limited links. Using superdense coding, entanglement can double the conferencing rate.
△ Less
Submitted 10 April, 2024; v1 submitted 18 March, 2023;
originally announced March 2023.
-
Correcting one error in channels with feedback
Authors:
Ilya Vorobyev,
Alexey Lebedev,
Vladimir Lebedev,
Christian Deppe
Abstract:
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit the same number of messages as in the case of comp…
▽ More
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit the same number of messages as in the case of complete feedback. We also apply the developed techniques to a binary asymmetric channel to construct transmission strategies for small lengths.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Deterministic $K$-identification For Slow Fading Channel
Authors:
Mohammad Javad Salariseddigh,
Muris Spahovic,
Christian Deppe
Abstract:
Deterministic $K$-identification (DKI) is addressed for Gaussian channels with slow fading (GSF), where the transmitter is restricted to an average power constraint and channel side information is available at the decoder. We derive lower and upper bounds on the DKI capacity when the number of identifiable messages $K$ may grow sub-linearly with the codeword length $n$. As a key finding, we establ…
▽ More
Deterministic $K$-identification (DKI) is addressed for Gaussian channels with slow fading (GSF), where the transmitter is restricted to an average power constraint and channel side information is available at the decoder. We derive lower and upper bounds on the DKI capacity when the number of identifiable messages $K$ may grow sub-linearly with the codeword length $n$. As a key finding, we establish that for deterministic encoding, assuming that the number of identifiable messages $K = 2^{κ\log n}$ with $κ\in [0,1)$ being the identification target rate, the codebook size scales as $2^{(n\log n)R}$, where $R$ is the coding rate.
△ Less
Submitted 8 December, 2022; v1 submitted 5 December, 2022;
originally announced December 2022.
-
Deterministic Identification For MC ISI-Poisson Channel
Authors:
Mohammad Javad Salariseddigh,
Vahid Jamali,
Uzi Pereg,
Holger Boche,
Christian Deppe,
Robert Schober
Abstract:
Several applications of molecular communications (MC) feature an alarm-prompt behavior for which the prevalent Shannon capacity may not be the appropriate performance metric. The identification capacity as an alternative measure for such systems has been motivated and established in the literature. In this paper, we study deterministic identification (DI) for the discrete-time \emph{Poisson} chann…
▽ More
Several applications of molecular communications (MC) feature an alarm-prompt behavior for which the prevalent Shannon capacity may not be the appropriate performance metric. The identification capacity as an alternative measure for such systems has been motivated and established in the literature. In this paper, we study deterministic identification (DI) for the discrete-time \emph{Poisson} channel (DTPC) with inter-symbol interference (ISI) where the transmitter is restricted to an average and a peak molecule release rate constraint. Such a channel serves as a model for diffusive MC systems featuring long channel impulse responses and employing molecule counting receivers. We derive lower and upper bounds on the DI capacity of the DTPC with ISI when the number of ISI channel taps $K$ may grow with the codeword length $n$ (e.g., due to increasing symbol rate). As a key finding, we establish that for deterministic encoding, the codebook size scales as $2^{(n\log n)R}$ assuming that the number of ISI channel taps scales as $K = 2^{κ\log n}$, where $R$ is the coding rate and $κ$ is the ISI rate. Moreover, we show that optimizing $κ$ leads to an effective identification rate [bits/s] that scales linearly with $n$, which is in contrast to the typical transmission rate [bits/s] that is independent of $n$.
△ Less
Submitted 6 December, 2022; v1 submitted 20 November, 2022;
originally announced November 2022.
-
Neuromorphic Twins for Networked Control and Decision-Making
Authors:
Holger Boche,
Yannik N. Böck,
Christian Deppe,
Frank H. P. Fitzek
Abstract:
We consider the problem of remotely tracking the state of and unstable linear time-invariant plant by means of data transmitted through a noisy communication channel from an algorithmic point of view. Assuming the dynamics of the plant are known, does there exist an algorithm that accepts a description of the channel's characteristics as input, and returns 'Yes' if the transmission capabilities pe…
▽ More
We consider the problem of remotely tracking the state of and unstable linear time-invariant plant by means of data transmitted through a noisy communication channel from an algorithmic point of view. Assuming the dynamics of the plant are known, does there exist an algorithm that accepts a description of the channel's characteristics as input, and returns 'Yes' if the transmission capabilities permit the remote tracking of the plant's state, 'No' otherwise? Does there exist an algorithm that, in case of a positive answer, computes a suitable encoder/decoder-pair for the channel? Questions of this kind are becoming increasingly important with regards to future communication technologies that aim to solve control engineering tasks in a distributed manner. In particular, they play an essential role in digital twinning, an emerging information processing approach originally considered in the context of Industry 4.0. Yet, the abovementioned questions have been answered in the negative with respect to algorithms that can be implemented on idealized digital hardware, i.e., Turing machines. In this article, we investigate the remote state estimation problem in view of the Blum-Shub-Smale computability framework. In the broadest sense, the latter can be interpreted as a model for idealized analog computation. Especially in the context of neuromorphic computing, analog hardware has experienced a revival in the past view years. Hence, the contribution of this work may serve as a motivation for a theory of neuromorphic twins as a counterpart to digital twins for analog hardware.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
Message Transmission and Common Randomness Generation over MIMO Slow Fading Channels with Arbitrary Channel State Distribution
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We investigate the problem of message transmission and the problem of common randomness (CR) generation over single-user multiple-input multiple-output (MIMO) slow fading channels with average input power constraint, additive white Gaussian noise (AWGN), arbitrary state distribution and with complete channel state information available at the receiver side (CSIR). First, we derive a lower and an u…
▽ More
We investigate the problem of message transmission and the problem of common randomness (CR) generation over single-user multiple-input multiple-output (MIMO) slow fading channels with average input power constraint, additive white Gaussian noise (AWGN), arbitrary state distribution and with complete channel state information available at the receiver side (CSIR). First, we derive a lower and an upper bound on the outage transmission capacity of MIMO slow fading channels for arbitrary state distribution and show that the bounds coincide except possibly at the points of discontinuity of the outage transmission capacity, of which there are, at most, countably many. To prove the lower bound on the outage transmission capacity, we also establish the capacity of a specific compound MIMO Gaussian channel. Second, we define the outage CR capacity for a two-source model with unidirectional communication over a MIMO slow fading channel with arbitrary state distribution and establish a lower and an upper bound on it using our bounds on the outage transmission capacity of the MIMO slow fading channel.
△ Less
Submitted 21 October, 2022;
originally announced October 2022.
-
Common Randomness Generation from Sources with Countable Alphabet
Authors:
Wafa Labidi,
Rami Ezzine,
Christian Deppe,
Moritz Wiese,
Holger Boche
Abstract:
We study a standard two-source model for common randomness (CR) generation in which Alice and Bob generate a common random variable with high probability of agreement by observing independent and identically distributed (i.i.d.) samples of correlated sources on countably infinite alphabets. The two parties are additionally allowed to communicate as little as possible over a noisy memoryless channe…
▽ More
We study a standard two-source model for common randomness (CR) generation in which Alice and Bob generate a common random variable with high probability of agreement by observing independent and identically distributed (i.i.d.) samples of correlated sources on countably infinite alphabets. The two parties are additionally allowed to communicate as little as possible over a noisy memoryless channel. In our work, we give a single-letter formula for the CR capacity for the proposed model and provide a rigorous proof of it. This is a challenging scenario because some of the finite alphabet properties, namely of the entropy can not be extended to the countably infinite case. Notably, it is known that the Shannon entropy is in fact discontinuous at all probability distributions with countably infinite support.
△ Less
Submitted 14 October, 2022; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Comparison of Quantum PUF models
Authors:
Vladlen Galetsky,
Soham Ghosh,
Christian Deppe,
Roberto Ferrara
Abstract:
Physical unclonable functions (PUFs) are hardware structures in a physical system (e.g. semiconductor, crystals etc.) that are used to enable unique identification of the semiconductor or to secure keys for cryptographic processes. A PUF thus generates a noisy secret reproducible at runtime. This secret can either be used to authenticate the chip, or it is available as a cryptographic key after re…
▽ More
Physical unclonable functions (PUFs) are hardware structures in a physical system (e.g. semiconductor, crystals etc.) that are used to enable unique identification of the semiconductor or to secure keys for cryptographic processes. A PUF thus generates a noisy secret reproducible at runtime. This secret can either be used to authenticate the chip, or it is available as a cryptographic key after removing the noise. Latest advancements in the field of quantum hardware, in some cases claiming to achieve quantum supremacy, highly target the fragility of current RSA type classical cryptosystems. As a solution, one would like to develop Quantum PUFs to mitigate such problem. There are several approaches for this technology. In our work we compare these different approaches and introduce the requirements for QTOKSim, a quantum token based authentication simulator testing its performance on a multi-factor authentication protocol.
△ Less
Submitted 1 November, 2022; v1 submitted 22 August, 2022;
originally announced August 2022.
-
A Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
Over the past decades, the problem of communication over finite-state Markov channels (FSMCs) has been investigated in many researches and the capacity of FSMCs has been studied in closed form under the assumption of the availability of partial/complete channel state information at the sender and/or the receiver. In our work, we focus on infinite-state Markov channels by investigating the problem…
▽ More
Over the past decades, the problem of communication over finite-state Markov channels (FSMCs) has been investigated in many researches and the capacity of FSMCs has been studied in closed form under the assumption of the availability of partial/complete channel state information at the sender and/or the receiver. In our work, we focus on infinite-state Markov channels by investigating the problem of message transmission over time-varying single-user multiple-input multiple-output (MIMO) Gauss-Markov Rayleigh fading channels with average power constraint and with complete channel state information available at the receiver side (CSIR). We completely solve the problem by giving a single-letter characterization of the channel capacity in closed form and by providing a proof of it.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Identification based on random coding
Authors:
Vladimir R. Sidorenko,
Christian Deppe
Abstract:
Ahlswede and Dueck showed possibility to identify with high probability one out of $M$ messages by transmitting $1/C\log\log M$ bits only, where $C$ is the channel capacity. It is known that this identification can be based on error-correcting codes. We propose an identification procedure based on random codes that achieves channel capacity. Then we show that this procedure can be simplified using…
▽ More
Ahlswede and Dueck showed possibility to identify with high probability one out of $M$ messages by transmitting $1/C\log\log M$ bits only, where $C$ is the channel capacity. It is known that this identification can be based on error-correcting codes. We propose an identification procedure based on random codes that achieves channel capacity. Then we show that this procedure can be simplified using pseudo-random generators.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
A General Formula for Uniform Common Randomness Capacity
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We generalize the uniform common randomness capacity formula, initially established by Ahslwede and Csiszár for a two-source model for common randomness generation from independent and identically distributed (i.i.d.) discrete sources with unidirectional communication over rate-limited discrete noiseless channels to the case when the one-way communication is over arbitrary single-user channels. In…
▽ More
We generalize the uniform common randomness capacity formula, initially established by Ahslwede and Csiszár for a two-source model for common randomness generation from independent and identically distributed (i.i.d.) discrete sources with unidirectional communication over rate-limited discrete noiseless channels to the case when the one-way communication is over arbitrary single-user channels. In our proof, we will make use of the transmission capacity formula established by Verdú and Han for arbitrary point-to-point channels.
△ Less
Submitted 9 September, 2022; v1 submitted 9 May, 2022;
originally announced May 2022.
-
Deterministic Identification for Molecular Communications over the Poisson Channel
Authors:
Mohammad Javad Salariseddigh,
Uzi Pereg,
Holger Boche,
Christian Deppe,
Vahid Jamali,
Robert Schober
Abstract:
Various applications of molecular communications (MC) are event-triggered, and, as a consequence, the prevalent Shannon capacity may not be the right measure for performance assessment. Thus, in this paper, we motivate and establish the identification capacity as an alternative metric. In particular, we study deterministic identification (DI) for the discrete-time Poisson channel (DTPC), subject t…
▽ More
Various applications of molecular communications (MC) are event-triggered, and, as a consequence, the prevalent Shannon capacity may not be the right measure for performance assessment. Thus, in this paper, we motivate and establish the identification capacity as an alternative metric. In particular, we study deterministic identification (DI) for the discrete-time Poisson channel (DTPC), subject to an average and a peak power constraint, which serves as a model for MC systems employing molecule counting receivers. It is established that the codebook size for this channel scales as $2^{(n\log n)R}$, where $n$ and $R$ are the codeword length and coding rate, respectively. Lower and upper bounds on the DI capacity of the DTPC are developed. The obtained large capacity of the DI channel sheds light on the performance of natural DI systems such as natural olfaction, which are known for their extremely large chemical discriminatory power in biology. Furthermore, numerical simulations for the empirical miss-identification and false identification error rates are provided for finite length codes. This allows us to quantify the scale of error reduction in terms of the codeword length.
△ Less
Submitted 5 March, 2022;
originally announced March 2022.
-
Non-adaptive and two-stage coding over the Z-channel
Authors:
Alexey Lebedev,
Ilya Vorobyev,
Vladimir Lebedev,
Christian Deppe
Abstract:
In this paper, we developed new coding strategies for the Z-channel. In particular, we look at the case with two-stage encoding. In this case, the encoder uses noiseless feedback once and adjusts the further encoding strategy based on the previous partial output of the channel. Nevertheless, the developed codes improve the known results with full feedback for small length and 1 error. A tool for t…
▽ More
In this paper, we developed new coding strategies for the Z-channel. In particular, we look at the case with two-stage encoding. In this case, the encoder uses noiseless feedback once and adjusts the further encoding strategy based on the previous partial output of the channel. Nevertheless, the developed codes improve the known results with full feedback for small length and 1 error. A tool for the two-stage strategy is the development of a new optimality condition for non-adaptive codes.
△ Less
Submitted 8 September, 2022; v1 submitted 31 January, 2022;
originally announced February 2022.
-
Common Randomness Generation from Gaussian Sources
Authors:
Wafa Labidi,
Rami Ezzine,
Christian Deppe,
Holger Boche
Abstract:
We study the problem of common randomness (CR) generation in the basic two-party communication setting in which the sender and the receiver aim to agree on a common random variable with high probability by observing independent and identically distributed (i.i.d.) samples of correlated Gaussian sources and while communicating as little as possible over a noisy memoryless channel. We completely sol…
▽ More
We study the problem of common randomness (CR) generation in the basic two-party communication setting in which the sender and the receiver aim to agree on a common random variable with high probability by observing independent and identically distributed (i.i.d.) samples of correlated Gaussian sources and while communicating as little as possible over a noisy memoryless channel. We completely solve the problem by giving a single-letter characterization of the CR capacity for the proposed model and by providing a rigorous proof of it. Interestingly, we prove that the CR capacity is infinite when the Gaussian sources are perfectly correlated.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Identification Over Quantum Broadcast Channels
Authors:
Johannes Rosenberger,
Christian Deppe,
Uzi Pereg
Abstract:
Identification over quantum broadcast channels is considered. As opposed to the information transmission task, the decoder only identifies whether a message of his choosing was sent or not. This relaxation allows for a double-exponential code size. An achievable identification region is derived for a quantum broadcast channel, and a full characterization for the class of classical-quantum broadcas…
▽ More
Identification over quantum broadcast channels is considered. As opposed to the information transmission task, the decoder only identifies whether a message of his choosing was sent or not. This relaxation allows for a double-exponential code size. An achievable identification region is derived for a quantum broadcast channel, and a full characterization for the class of classical-quantum broadcast channels. The identification capacity region of the single-mode pure-loss bosonic broadcast channel is obtained as a consequence. Furthermore, the results are demonstrated for the quantum erasure broadcast channel, where our region is suboptimal, but improves on the best previously known bounds.
△ Less
Submitted 1 August, 2023; v1 submitted 26 January, 2022;
originally announced January 2022.
-
A Rigorous Proof of the Capacity of MIMO Gauss-Markov Rayleigh Fading Channels
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We investigate the problem of message transmission over time-varying single-user multiple-input multiple-output (MIMO) Rayleigh fading channels with average power constraint and with complete channel state information available at the receiver side (CSIR). To describe the channel variations over the time, we consider a first-order Gauss-Markov model. We completely solve the problem by giving a sin…
▽ More
We investigate the problem of message transmission over time-varying single-user multiple-input multiple-output (MIMO) Rayleigh fading channels with average power constraint and with complete channel state information available at the receiver side (CSIR). To describe the channel variations over the time, we consider a first-order Gauss-Markov model. We completely solve the problem by giving a single-letter characterization of the channel capacity in closed form and by providing a rigorous proof of it.
△ Less
Submitted 13 April, 2022; v1 submitted 10 January, 2022;
originally announced January 2022.
-
Communication with Unreliable Entanglement Assistance
Authors:
Uzi Pereg,
Christian Deppe,
Holger Boche
Abstract:
Entanglement resources can increase transmission rates substantially. Unfortunately, entanglement is a fragile resource that is quickly degraded by decoherence effects. In order to generate entanglement for optical communication, the transmitter and the receiver first prepare entangled spin-photon pairs locally, and then the photon at the transmitter is sent to the receiver through an optical fibe…
▽ More
Entanglement resources can increase transmission rates substantially. Unfortunately, entanglement is a fragile resource that is quickly degraded by decoherence effects. In order to generate entanglement for optical communication, the transmitter and the receiver first prepare entangled spin-photon pairs locally, and then the photon at the transmitter is sent to the receiver through an optical fiber or free space. Without feedback, the transmitter does not know whether the entangled photon has reached the receiver. The present work introduces a new model of unreliable entanglement assistance, whereby the communication system operates whether entanglement assistance is present or not. While the sender is ignorant, the receiver knows whether the entanglement generation was successful. In the case of a failure, the receiver decodes less information. In this manner, the effective transmission rate is adapted according to the assistance status. Regularized formulas are derived for the classical and quantum capacity regions with unreliable entanglement assistance, characterizing the tradeoff between the unassisted rate and the excess rate that can be obtained from entanglement assistance. It is further established that time division between entanglement-assisted and unassisted coding strategies is optimal for the noiseless qubit channel, but can be strictly suboptimal for a noisy channel.
△ Less
Submitted 4 March, 2023; v1 submitted 16 December, 2021;
originally announced December 2021.
-
The Quantum Multiple-Access Channel with Cribbing Encoders
Authors:
Uzi Pereg,
Christian Deppe,
Holger Boche
Abstract:
Communication over a quantum multiple-access channel (MAC) with cribbing encoders is considered, whereby Transmitter 2 performs a measurement on a system that is entangled with Transmitter 1. Based on the no-cloning theorem, perfect cribbing is impossible. This leads to the introduction of a MAC model with noisy cribbing. In the causal and non-causal cribbing scenarios, Transmitter 2 performs the…
▽ More
Communication over a quantum multiple-access channel (MAC) with cribbing encoders is considered, whereby Transmitter 2 performs a measurement on a system that is entangled with Transmitter 1. Based on the no-cloning theorem, perfect cribbing is impossible. This leads to the introduction of a MAC model with noisy cribbing. In the causal and non-causal cribbing scenarios, Transmitter 2 performs the measurement before the input of Transmitter 1 is sent through the channel. Hence, Transmitter 2's cribbing may inflict a "state collapse" for Transmitter 1. Achievable regions are derived for each setting. Furthermore, a regularized capacity characterization is established for robust cribbing, i.e. when the cribbing system contains all the information of the channel input. Building on the analogy between the noisy cribbing model and the relay channel, a partial decode-forward region is derived for a quantum MAC with non-robust cribbing. For the classical-quantum MAC with cribbing encoders, the capacity region is determined with perfect cribbing of the classical input, and a cutset region is derived for noisy cribbing. In the special case of a classical-quantum MAC with a deterministic cribbing channel, the inner and outer bounds coincide.
△ Less
Submitted 9 May, 2022; v1 submitted 30 November, 2021;
originally announced November 2021.
-
Identification over Compound Multiple-Input Multiple-Output Broadcast Channels
Authors:
Johannes Rosenberger,
Uzi Pereg,
Christian Deppe
Abstract:
The identification capacity region of the compound broadcast channel is determined under an average error criterion, where the sender has no channel state information. We give single-letter identification capacity formulas for discrete channels and multiple-input multiple-output Gaussian channels under an average input constraint. The capacity theorems apply to general discrete memoryless broadcas…
▽ More
The identification capacity region of the compound broadcast channel is determined under an average error criterion, where the sender has no channel state information. We give single-letter identification capacity formulas for discrete channels and multiple-input multiple-output Gaussian channels under an average input constraint. The capacity theorems apply to general discrete memoryless broadcast channels. This is in contrast to the transmission setting, where the capacity is only known for special cases, notably the degraded broadcast channel and the multiple-input multiple-output broadcast channel with private messages. Furthermore, the identification capacity region of the compound multiple-input multiple-output broadcast channel can be larger than the transmission capacity region. This is a departure from the single-user behavior of identification, since the identification capacity of a single-user channel equals the transmission capacity.
△ Less
Submitted 2 December, 2021; v1 submitted 28 October, 2021;
originally announced October 2021.
-
Integrating Quantum Simulation for Quantum-Enhanced Classical Network Emulation
Authors:
Stephen DiAdamo,
Janis Nötzel,
Simon Sekavčnik,
Riccardo Bassoli,
Roberto Ferrara,
Christian Deppe,
Frank Fitzek,
Holger Boche
Abstract:
We describe a method of investigating the near-term potential of quantum communication technology for communication networks from the perspective of current networks. For this, we integrate an instance of the quantum network simulator QuNetSim at the link layer into the communication network emulator ComNetsEmu. This novel augmented version of ComNetsEmu is thereby enabled to run arbitrary quantum…
▽ More
We describe a method of investigating the near-term potential of quantum communication technology for communication networks from the perspective of current networks. For this, we integrate an instance of the quantum network simulator QuNetSim at the link layer into the communication network emulator ComNetsEmu. This novel augmented version of ComNetsEmu is thereby enabled to run arbitrary quantum protocols between any directly connected pair of network hosts. To give an example of the proposed method, we implement the link layer method of generating and storing entanglement while idle, to accelerate data transmission at later times using superdense coding.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
Classical State Masking over a Quantum Channel
Authors:
Uzi Pereg,
Christian Deppe,
Holger Boche
Abstract:
Transmission of classical information over a quantum state-dependent channel is considered, when the encoder can measure channel side information (CSI) and is required to mask information on the quantum channel state from the decoder. In this quantum setting, it is essential to conceal the CSI measurement as well. A regularized formula is derived for the masking equivocation region, and a full cha…
▽ More
Transmission of classical information over a quantum state-dependent channel is considered, when the encoder can measure channel side information (CSI) and is required to mask information on the quantum channel state from the decoder. In this quantum setting, it is essential to conceal the CSI measurement as well. A regularized formula is derived for the masking equivocation region, and a full characterization is established for a class of measurement channels.
△ Less
Submitted 4 January, 2022; v1 submitted 26 September, 2021;
originally announced September 2021.
-
Reed-Muller Identification
Authors:
Mattia Spandri,
Roberto Ferrara,
Christian Deppe
Abstract:
Ahlswede and Dueck identification has the potential of exponentially reducing traffic or exponentially increasing rates in applications where a full decoding of the message is not necessary and, instead, a simple verification of the message of interest suffices. However, the proposed constructions can suffer from exponential increase in the computational load at the sender and receiver, rendering…
▽ More
Ahlswede and Dueck identification has the potential of exponentially reducing traffic or exponentially increasing rates in applications where a full decoding of the message is not necessary and, instead, a simple verification of the message of interest suffices. However, the proposed constructions can suffer from exponential increase in the computational load at the sender and receiver, rendering these advantages unusable. This has been shown in particular to be the case for a construction achieving identification capacity based on concatenated Reed-Solomon codes. Here, we consider the natural generalization of identification based on Reed-Muller codes and we show that, although without achieving identification capacity, they allow to achieve the exponentially large rates mentioned above without the computational penalty increasing too much the latency with respect to transmission.
△ Less
Submitted 12 October, 2023; v1 submitted 15 July, 2021;
originally announced July 2021.
-
Implementation and Experimental Evaluation of Reed-Solomon Identification
Authors:
Roberto Ferrara,
Luis Torres-Figueroa,
Holger Boche,
Christian Deppe,
Wafa Labidi,
Ullrich Mönich,
Andrei Vlad-Costin
Abstract:
Identification is a communication paradigm that promises exponential advantages over transmission for applications that do not actually require all messages to be reliably transmitted. Notably, the identification capacity theorems prove exponentially larger rates compared to classical transmission. However, there exist additional trade-offs that are not captured by these theorems and which become…
▽ More
Identification is a communication paradigm that promises exponential advantages over transmission for applications that do not actually require all messages to be reliably transmitted. Notably, the identification capacity theorems prove exponentially larger rates compared to classical transmission. However, there exist additional trade-offs that are not captured by these theorems and which become relevant for the deployment of identification in practical communication settings. In particular, in this paper we evaluate the latency introduced by computations at the encoder and decoder when employing identification codes. For this, we implement them using an explicit code construction based on Reed-Solomon codes and integrate it into a single carrier transmission system using software-defined radios. Our evaluation of the practical aspects of identification codes show that unless care is taken, these trade-offs can compromise the theoretical advantage given by the exponentially large identification rates.
△ Less
Submitted 24 September, 2023; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Deterministic Identification Over Poisson Channels
Authors:
Mohammad J. Salariseddigh,
Uzi Pereg,
Holger Boche,
Christian Deppe,
Robert Schober
Abstract:
Deterministic identification (DI) for the discrete-time Poisson channel, subject to an average and a peak power constraint, is considered. It is established that the code size scales as $2^{(n\log n)R}$, where $n$ and $R$ are the block length and coding rate, respectively. The authors have recently shown a similar property for Gaussian channels [1]. Lower and upper bounds on the DI capacity of the…
▽ More
Deterministic identification (DI) for the discrete-time Poisson channel, subject to an average and a peak power constraint, is considered. It is established that the code size scales as $2^{(n\log n)R}$, where $n$ and $R$ are the block length and coding rate, respectively. The authors have recently shown a similar property for Gaussian channels [1]. Lower and upper bounds on the DI capacity of the Poisson channel are developed in this scale. Those imply that the DI capacity is infinite in the exponential scale, regardless of the dark current, i.e., the channel noise parameter.
△ Less
Submitted 28 September, 2021; v1 submitted 13 July, 2021;
originally announced July 2021.
-
The Computational and Latency Advantage of Quantum Communication Networks
Authors:
Roberto Ferrara,
Riccardo Bassoli,
Christian Deppe,
Frank H. P. Fitzek,
Holger Boche
Abstract:
This article summarises the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. By now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve the needs of quantum computers. In fact, the scientifi…
▽ More
This article summarises the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. By now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve the needs of quantum computers. In fact, the scientific community is still investigating on the possible use cases/benefits that quantum communication networks can bring. Thus, this article aims at pointing out and clearly describing how quantum communication networks can enhance in-network distributed computing and reduce the overall end-to-end latency, beyond the intrinsic limits of classical technologies. Furthermore, we also explain how entanglement can reduce the communication complexity (overhead) that future classical virtualised networks will experience.
△ Less
Submitted 7 June, 2021;
originally announced June 2021.
-
Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading Channels
Authors:
Rami Ezzine,
Moritz Wiese,
Christian Deppe,
Holger Boche
Abstract:
We investigate the problem of common randomness (CR) generation from discrete correlated sources aided by one-way communication over single-user multiple-input multiple-output (MIMO) slow fading channels with additive white Gaussian noise (AWGN), arbitrary state distribution and with channel state information available at the receiver side (CSIR). We completely solve the problem by first character…
▽ More
We investigate the problem of common randomness (CR) generation from discrete correlated sources aided by one-way communication over single-user multiple-input multiple-output (MIMO) slow fading channels with additive white Gaussian noise (AWGN), arbitrary state distribution and with channel state information available at the receiver side (CSIR). We completely solve the problem by first characterizing the channel outage capacity of MIMO slow fading channels for arbitrary state distribution. For this purpose, we also provide an achievable rate for a specific compound MIMO Gaussian channel. Second, we define the outage CR capacity of the MIMO slow fading channel and establish a single-letter characterization of it using our result on its outage transmission capacity.
△ Less
Submitted 18 October, 2021; v1 submitted 13 May, 2021;
originally announced May 2021.