-
LO, NLO, and NNLO Parton Distributions for LHC Event Generators
Authors:
Juan Cruz-Martinez,
Stefano Forte,
Niccolo Laurenti,
Tanjona R. Rabemananjara,
Juan Rojo
Abstract:
We present NNPDF4.0MC, a variant of the NNPDF4.0 set of parton distributions (PDFs) at LO, NLO and NNLO, with and without inclusion of the photon PDF, suitable for use with Monte Carlo (MC) event generators, which require PDFs to satisfy additional constraints in comparison to standard PDF sets. These requirements include PDF positivity down to a low scale $Q\sim 1$ GeV, smooth extrapolation in th…
▽ More
We present NNPDF4.0MC, a variant of the NNPDF4.0 set of parton distributions (PDFs) at LO, NLO and NNLO, with and without inclusion of the photon PDF, suitable for use with Monte Carlo (MC) event generators, which require PDFs to satisfy additional constraints in comparison to standard PDF sets. These requirements include PDF positivity down to a low scale $Q\sim 1$ GeV, smooth extrapolation in the very small and large $x$ regions, and numerically stable results even in extreme regions of phase space for all PDFs. We compare the NNPDF4.0MC PDFs to their baseline NNPDF4.0 counterparts, and to the NNPDF2.3LO set entering the Monash tune of the Pythia8 event generator. We briefly assess the phenomenological impact of these PDFs on the cross-sections for hard and soft QCD processes at the LHC.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
NNPDF4.0 aN$^3$LO PDFs with QED corrections
Authors:
Andrea Barontini,
Niccolo Laurenti,
Juan Rojo
Abstract:
We review recent progress in the global determination of the collinear parton distributions (PDFs) of the proton within the NNPDF framework. This progress includes NNPDF4.0 variants with QED effects and with missing higher order uncertainties (MHOUs) via the theory covariance matrix formalism, as well as PDFs based on QCD calculations at approximate N$^3$LO (aN$^3$LO) accuracy. We present the comb…
▽ More
We review recent progress in the global determination of the collinear parton distributions (PDFs) of the proton within the NNPDF framework. This progress includes NNPDF4.0 variants with QED effects and with missing higher order uncertainties (MHOUs) via the theory covariance matrix formalism, as well as PDFs based on QCD calculations at approximate N$^3$LO (aN$^3$LO) accuracy. We present the combination of these theoretical developments resulting into NNPDF4.0 aN$^3$LO variants accounting for QED corrections and with a photon PDF. We compare these aN$^3$LO QED PDFs with analogous results obtained by the MSHT group, and briefly quantify their implications at the level of representative LHC cross-sections.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
The Path to N$^3$LO Parton Distributions
Authors:
The NNPDF Collaboration,
Richard D. Ball,
Andrea Barontini,
Alessandro Candido,
Stefano Carrazza,
Juan Cruz-Martinez,
Luigi Del Debbio,
Stefano Forte,
Tommaso Giani,
Felix Hekhorn,
Zahari Kassabov,
Niccolò Laurenti,
Giacomo Magni,
Emanuele R. Nocera,
Tanjona R. Rabemananjara,
Juan Rojo,
Christopher Schwan,
Roy Stegeman,
Maria Ubiali
Abstract:
We extend the existing leading (LO), next-to-leading (NLO), and next-to-next-to-leading order (NNLO) NNPDF4.0 sets of parton distribution functions (PDFs) to approximate next-to-next-to-next-to-leading order (aN$^3$LO). We construct an approximation to the N$^3$LO splitting functions that includes all available partial information from both fixed-order computations and from small and large $x$ res…
▽ More
We extend the existing leading (LO), next-to-leading (NLO), and next-to-next-to-leading order (NNLO) NNPDF4.0 sets of parton distribution functions (PDFs) to approximate next-to-next-to-next-to-leading order (aN$^3$LO). We construct an approximation to the N$^3$LO splitting functions that includes all available partial information from both fixed-order computations and from small and large $x$ resummation, and estimate the uncertainty on this approximation by varying the set of basis functions used to construct the approximation. We include known N$^3$LO corrections to deep-inelastic scattering structure functions and extend the FONLL general-mass scheme to $\mathcal{O}\left( α_s^3\right)$ accuracy. We determine a set of aN$^3$LO PDFs by accounting both for the uncertainty on splitting functions due to the incomplete knowledge of N$^3$LO terms, and to the uncertainty related to missing higher corrections (MHOU), estimated by scale variation, through a theory covariance matrix formalism. We assess the perturbative stability of the resulting PDFs, we study the impact of MHOUs on them, and we compare our results to the aN$^3$LO PDFs from the MSHT group. We examine the phenomenological impact of aN$^3$LO corrections on parton luminosities at the LHC, and give a first assessment of the impact of aN$^3$LO PDFs on the Higgs and Drell-Yan total production cross-sections. We find that the aN$^3$LO NNPDF4.0 PDFs are consistent within uncertainties with their NNLO counterparts, that they improve the description of the global dataset and the perturbative convergence of Higgs and Drell-Yan cross-sections, and that MHOUs on PDFs decrease substantially with the increase of perturbative order.
△ Less
Submitted 5 July, 2024; v1 submitted 28 February, 2024;
originally announced February 2024.
-
Construction of a next-to-next-to-next-to-leading order approximation for heavy flavour production in deep inelastic scattering with quark masses
Authors:
Niccolò Laurenti
Abstract:
The subject of this thesis is the construction of an approximation for the next-to-next-to-next-to leading order (N^3LO) deep inelastic scattering (DIS) massive coefficient function of the gluon for F2 in heavy quark pair production. Indeed, this object is one of the ingredients needed for the construction of any variable flavour number (factorization) scheme at O(alphas^3). The construction of su…
▽ More
The subject of this thesis is the construction of an approximation for the next-to-next-to-next-to leading order (N^3LO) deep inelastic scattering (DIS) massive coefficient function of the gluon for F2 in heavy quark pair production. Indeed, this object is one of the ingredients needed for the construction of any variable flavour number (factorization) scheme at O(alphas^3). The construction of such scheme is crucial for the improvement of the accuracy of the extraction of the parton distribution functions from the experimental data, that in turn will provide an improvement of the accuracy of all the theoretical predictions in high energy physics.
Despite the function we are interested in is not known exactly, its expansion in some kinematic limits is available. In particular the high-scale limit (Q^2 >> m^2), high-energy limit (z->0, where z is the argument of the coefficient function) and threshold limit (z->zmax=1/(1+4m^2/Q^2)) of the exact coefficient function are all known, with the exception of some terms that we will provide in approximate form. Therefore, combining these limits in a proper way, we will construct an approximation for the unknown term of the N^3LO gluon coefficient function, that describes the exact curve in the whole range of z.
Since other approximations for the N^3LO gluon coefficient functions are present in the literature, we will conclude by comparing our final approximate coefficient functions with such approximations. We will show a comparison both for the NNLO, whose exact function is known, and for the N^3LO. With our approach, we expect our results to be more accurate than previous approximations, thus providing a sufficient precision for a complete description of DIS at N^3LO and the consequent determination of N^3LO PDFs.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Determination of the theory uncertainties from missing higher orders on NNLO parton distributions with percent accuracy
Authors:
The NNPDF Collaboration,
Richard D. Ball,
Andrea Barontini,
Alessandro Candido,
Stefano Carrazza,
Juan Cruz-Martinez,
Luigi Del Debbio,
Stefano Forte,
Tommaso Giani,
Felix Hekhorn,
Zahari Kassabov,
Niccolò Laurenti,
Giacomo Magni,
Emanuele R. Nocera,
Tanjona R. Rabemananjara,
Juan Rojo,
Christopher Schwan,
Roy Stegeman,
Maria Ubiali
Abstract:
We include uncertainties due to missing higher order corrections to QCD computations (MHOU) used in the determination of parton distributions (PDFs) in the recent NNPDF4.0 set of PDFs. We use our previously published methodology, based on the treatment of MHOUs and their full correlations through a theory covariance matrix determined by scale variation, now fully incorporated in the new NNPDF theo…
▽ More
We include uncertainties due to missing higher order corrections to QCD computations (MHOU) used in the determination of parton distributions (PDFs) in the recent NNPDF4.0 set of PDFs. We use our previously published methodology, based on the treatment of MHOUs and their full correlations through a theory covariance matrix determined by scale variation, now fully incorporated in the new NNPDF theory pipeline. We assess the impact of the inclusion of MHOUs on the NNPDF4.0 central values and uncertainties, and specifically show that they lead to improved consistency of the PDF determination with an ensuing moderate reduction of PDF uncertainties at NNLO.
△ Less
Submitted 4 July, 2024; v1 submitted 18 January, 2024;
originally announced January 2024.
-
Photons in the proton: implications for the LHC
Authors:
The NNPDF Collaboration,
Richard D. Ball,
Andrea Barontini,
Alessandro Candido,
Stefano Carrazza,
Juan Cruz-Martinez,
Luigi Del Debbio,
Stefano Forte,
Tommaso Giani,
Felix Hekhorn,
Zahari Kassabov,
Niccolò Laurenti,
Giacomo Magni,
Emanuele R. Nocera,
Tanjona R. Rabemananjara,
Juan Rojo,
Christopher Schwan,
Roy Stegeman,
Maria Ubiali
Abstract:
We construct a set of parton distribution functions (PDFs), based on the recent NNPDF4.0 PDF set, that also include a photon PDF. The photon PDF is constructed using the LuxQED formalism, while QED evolution accounting for O(alpha), O(alpha alphas) and O(alpha^2) corrections is implemented and benchmarked by means of the EKO code. We investigate the impact of QED effects on NNPDF4.0, and compare o…
▽ More
We construct a set of parton distribution functions (PDFs), based on the recent NNPDF4.0 PDF set, that also include a photon PDF. The photon PDF is constructed using the LuxQED formalism, while QED evolution accounting for O(alpha), O(alpha alphas) and O(alpha^2) corrections is implemented and benchmarked by means of the EKO code. We investigate the impact of QED effects on NNPDF4.0, and compare our results both to our previous NNPDF3.1QED PDF set and to other recent PDF sets that include the photon. We assess the impact of photon-initiated processes and electroweak corrections on a variety of representative LHC processes, and find that they can reach the 5% level in vector boson pair production at large invariant mass.
△ Less
Submitted 4 July, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
The Tree of Light as interstellar optical transmitter system
Authors:
Elisa Bazzani,
Anna Valeria Guglielmi,
Roberto Corvaja,
Nicola Laurenti,
Filippo Romanato,
Gianluca Ruffato,
Andrea Vogliardi,
Francesco Vedovato,
Giuseppe Vallone,
Lorenzo Vangelista,
Paolo Villoresi
Abstract:
This work aims at investigating the optical transmission system needed for such lightweight sail, taking into account the physical constraints of such unprecedented link and focusing on the optimal scheme for the optical signal emission. In particular, the optical signal is distributed to several emitters on the sail. The light diffraction resulting from the pattern of the emitters acting coherent…
▽ More
This work aims at investigating the optical transmission system needed for such lightweight sail, taking into account the physical constraints of such unprecedented link and focusing on the optimal scheme for the optical signal emission. In particular, the optical signal is distributed to several emitters on the sail. The light diffraction resulting from the pattern of the emitters acting coherently determines the characteristics of the whole beam transmitted by the sail and of the received signal on the Earth. The performance of the digital communication system using pulse position modulation (PPM) can be assessed and channel coding schemes are proposed. We are using the paradigm for which the entire sail communication system is described as a Tree-of-light: the detectors, CPU, memory and laser transmitter are the central unit, representing the trunk of the tree. The branches of the tree are the waveguides, directed to the sail surface. By means of multimode splitters, the signal is further distributed via the petioles to the emitters, the leaves, realized by grating couplers (GCs), on which this work is more focused.
△ Less
Submitted 3 August, 2023;
originally announced August 2023.
-
It Is Rude to Ask a Sensor Its Age-of-Information: Status Updates Against an Eavesdrop** Node
Authors:
Laura Crosara,
Nicola Laurenti,
Leonardo Badia
Abstract:
We consider periodical status updates between a transmitter and a legitimate receiver, in the presence of an eavesdropper that is sometimes able to capture pieces of information. We assume that, in the absence of such a threat, the connection between the transmitter and the receiver is controlled by the transmitter with the aim to minimize the age of information at the receiver's side. However, if…
▽ More
We consider periodical status updates between a transmitter and a legitimate receiver, in the presence of an eavesdropper that is sometimes able to capture pieces of information. We assume that, in the absence of such a threat, the connection between the transmitter and the receiver is controlled by the transmitter with the aim to minimize the age of information at the receiver's side. However, if the presence of an eavesdropper is known, the transmitter may further tune the generation rate of status updates to trade off the age of information values acquired by the eavesdropper and the receiver, respectively. To analyze this problem, we first propose a metric that combines both objectives according to a Bergson social welfare framework, and then we solve the problem of finding the optimal generation rate as a function of the probability of data capture by the eavesdropper. This enables us to derive notable and sometimes counter-intuitive conclusions, and possibly establish an extension of the age of information framework to security aspects from a performance evaluation perspective.
△ Less
Submitted 14 June, 2023;
originally announced June 2023.
-
On the Limits of Cross-Authentication Checks for GNSS Signals
Authors:
Francesco Ardizzon,
Laura Crosara,
Stefano Tomasin,
Nicola Laurenti
Abstract:
Global navigation satellite systems (GNSSs) are implementing security mechanisms: examples are Galileo open service navigation message authentication (OS-NMA) and GPS chips-message robust authentication (CHIMERA). Each of these mechanisms operates in a single band. However, nowadays, even commercial GNSS receivers typically compute the position, velocity, and time (PVT) solution using multiple con…
▽ More
Global navigation satellite systems (GNSSs) are implementing security mechanisms: examples are Galileo open service navigation message authentication (OS-NMA) and GPS chips-message robust authentication (CHIMERA). Each of these mechanisms operates in a single band. However, nowadays, even commercial GNSS receivers typically compute the position, velocity, and time (PVT) solution using multiple constellations and signals from multiple bands at once, significantly improving both accuracy and availability. Hence, cross-authentication checks have been proposed, based on the PVT obtained from the mixture of authenticated and non-authenticated signals.
In this paper, first, we formalize the models for the cross-authentication checks. Next, we describe, for each check, a spoofing attack to generate a fake signal leading the victim to a target PVT without notice. We analytically relate the degrees of the freedom of the attacker in manipulating the victim's solution to both the employed security checks and the number of open signals that can be tampered with by the attacker. We test the performance of the considered attack strategies on an experimental dataset. Lastly, we show the limits of the PVT-based GNSS cross-authentication checks, where both authenticated and non-authenticated signals are used.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
On the Optimal Spoofing Attack and Countermeasure in Satellite Navigation Systems
Authors:
Laura Crosara,
Francesco Ardizzon,
Stefano Tomasin,
Nicola Laurenti
Abstract:
The threat of signal spoofing attacks against GNSS has grown in recent years and has motivated the study of anti-spoofing techniques. However, defense methods have been designed only against specific attacks. This paper introduces a general model of the spoofing attack framework in GNSS, from which optimal attack and defense strategies are derived. We consider a scenario with a legitimate receiver…
▽ More
The threat of signal spoofing attacks against GNSS has grown in recent years and has motivated the study of anti-spoofing techniques. However, defense methods have been designed only against specific attacks. This paper introduces a general model of the spoofing attack framework in GNSS, from which optimal attack and defense strategies are derived. We consider a scenario with a legitimate receiver (Bob) testing if the received signals come from multiple legitimate space vehicles (Alice) or from an attack device (Eve). We first derive the optimal attack strategy against a Gaussian transmission from Alice, by minimizing an outer bound on the achievable error probability region of the spoofing detection test. Then, framing the spoofing and its detection as an adversarial game, we show that the Gaussian transmission and the corresponding optimal attack constitute a Nash equilibrium. Lastly, we consider the case of practical modulation schemes for Alice and derive the generalized likelihood ratio test. Numerical results validate the analytical derivations and show that the bound on the achievable error region is representative of the actual performance.
△ Less
Submitted 3 February, 2023;
originally announced February 2023.
-
Approximating missing higher-orders in transverse momentum distributions using resummations
Authors:
Niccolò Laurenti,
Tanjona R. Rabemananjara,
Roy Stegeman
Abstract:
We present a more reliable approach to approximate the unknown next-to-next-to-next-to-leading order (N3LO) transverse momentum distribution of colourless final states, namely the Higgs boson produced via gluon fusion and the lepton pair produced via Drell--Yan (DY) mechanism. The approximation we construct relies on the combination of various resummation formalisms -- namely threshold, small-pt a…
▽ More
We present a more reliable approach to approximate the unknown next-to-next-to-next-to-leading order (N3LO) transverse momentum distribution of colourless final states, namely the Higgs boson produced via gluon fusion and the lepton pair produced via Drell--Yan (DY) mechanism. The approximation we construct relies on the combination of various resummation formalisms -- namely threshold, small-pt and high energy resummations -- by exploiting the singularity structure of the large logarithms in Mellin space. We show that for the case of Higgs boson production, the approximate N3LO transverse momentum distribution amounts to a correction of a few percent with respect to the NNLO result with a reduction in the scale dependence.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
Information Theoretic Key Agreement Protocol based on ECG signals
Authors:
Anna V. Guglielmi,
Alberto Muraro,
Giulia Cisotto,
Nicola Laurenti
Abstract:
Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in 2020 we assisted to an unprecedented inc…
▽ More
Wireless body area networks (WBANs) are becoming increasingly popular as they allow individuals to continuously monitor their vitals and physiological parameters remotely from the hospital. With the spread of the SARS-CoV-2 pandemic, the availability of portable pulse-oximeters and wearable heart rate detectors has boomed in the market. At the same time, in 2020 we assisted to an unprecedented increase of healthcare breaches, revealing the extreme vulnerability of the current generation of WBANs. Therefore, the development of new security protocols to ensure data protection, authentication, integrity and privacy within WBANs are highly needed. Here, we targeted a WBAN collecting ECG signals from different sensor nodes on the individual's body, we extracted the inter-pulse interval (i.e., R-R interval) sequence from each of them, and we developed a new information theoretic key agreement protocol that exploits the inherent randomness of ECG to ensure authentication between sensor pairs within the WBAN. After proper pre-processing, we provide an analytical solution that ensures robust authentication; we provide a unique information reconciliation matrix, which gives good performance for all ECG sensor pairs; and we can show that a relationship between information reconciliation and privacy amplification matrices can be found. Finally, we show the trade-off between the level of security, in terms of key generation rate, and the complexity of the error correction scheme implemented in the system.
△ Less
Submitted 14 May, 2021;
originally announced May 2021.
-
Free-space optical channel estimation for physical layer security
Authors:
Hiroyuki Endo,
Mikio Fujiwara,
Mitsuo Kitamura,
Toshiyuki Ito,
Morio Toyoshima,
Yoshihisa Takayama,
Hideki Takenaka,
Ryosuke Shimizu,
Nicola Laurenti,
Giuseppe Vallone,
Paolo Villoresi,
Takao Aoki,
Masahide Sasaki
Abstract:
We present experimental data on message transmission in a free-space optical (FSO) link at an eye-safe wavelength, using a testbed consisting of one sender and two receiver terminals, where the latter two are a legitimate receiver and an eavesdropper. The testbed allows us to emulate a typical scenario of physical-layer (PHY) security such as satellite-to-ground laser communications. We estimate i…
▽ More
We present experimental data on message transmission in a free-space optical (FSO) link at an eye-safe wavelength, using a testbed consisting of one sender and two receiver terminals, where the latter two are a legitimate receiver and an eavesdropper. The testbed allows us to emulate a typical scenario of physical-layer (PHY) security such as satellite-to-ground laser communications. We estimate information-theoretic metrics including secrecy rate, secrecy outage probability, and expected code lengths for given secrecy criteria based on observed channel statistics. We then discuss operation principles of secure message transmission under realistic fading conditions, and provide a guideline on a multi-layer security architecture by combining PHY security and upper-layer (algorithmic) security.
△ Less
Submitted 10 July, 2016;
originally announced July 2016.
-
Achievable Secrecy Rates of an Energy Harvesting Device
Authors:
Alessandro Biason,
Nicola Laurenti,
Michele Zorzi
Abstract:
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a receiver and a malicious eavesdropper. In particular, because of the energy constraints and the channel conditions, it is important to understand whe…
▽ More
The secrecy rate represents the amount of information per unit time that can be securely sent on a communication link. In this work, we investigate the achievable secrecy rates in an energy harvesting communication system composed of a transmitter, a receiver and a malicious eavesdropper. In particular, because of the energy constraints and the channel conditions, it is important to understand when a device should transmit and to optimize how much power should be used in order to improve security. Both full knowledge and partial knowledge of the channel are considered under a Nakagami fading scenario. We show that high secrecy rates can be obtained only with power and coding rate adaptation. Moreover, we highlight the importance of optimally dividing the transmission power in the frequency domain, and note that the optimal scheme provides high gains in secrecy rate over the uniform power splitting case. Analytically, we explain how to find the optimal policy and prove some of its properties. In our numerical evaluation, we discuss how the maximum achievable secrecy rate changes according to the various system parameters. Furthermore, we discuss the effects of a finite battery on the system performance and note that, in order to achieve high secrecy rates, it is not necessary to use very large batteries.
△ Less
Submitted 18 March, 2016; v1 submitted 21 August, 2015;
originally announced August 2015.
-
Experimental quantum key distribution with finite-key security analysis for noisy channels
Authors:
Davide Bacco,
Matteo Canale,
Nicola Laurenti,
Giuseppe Vallone,
Paolo Villoresi
Abstract:
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure…
▽ More
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
△ Less
Submitted 17 June, 2014;
originally announced June 2014.
-
Achievable Secrecy Rates over MIMOME Gaussian Channels with GMM Signals in Low-Noise Regime
Authors:
Francesco Renna,
Nicola Laurenti,
Stefano Tomasin
Abstract:
We consider a wiretap multiple-input multiple-output multiple-eavesdropper (MIMOME) channel, where agent Alice aims at transmitting a secret message to agent Bob, while leaking no information on it to an eavesdropper agent Eve. We assume that Alice has more antennas than both Bob and Eve, and that she has only statistical knowledge of the channel towards Eve. We focus on the low-noise regime, and…
▽ More
We consider a wiretap multiple-input multiple-output multiple-eavesdropper (MIMOME) channel, where agent Alice aims at transmitting a secret message to agent Bob, while leaking no information on it to an eavesdropper agent Eve. We assume that Alice has more antennas than both Bob and Eve, and that she has only statistical knowledge of the channel towards Eve. We focus on the low-noise regime, and assess the secrecy rates that are achievable when the secret message determines the distribution of a multivariate Gaussian mixture model (GMM) from which a realization is generated and transmitted over the channel. In particular, we show that if Eve has fewer antennas than Bob, secret transmission is always possible at low-noise. Moreover, we show that in the low-noise limit the secrecy capacity of our scheme coincides with its unconstrained capacity, by providing a class of covariance matrices that allow to attain such limit without the need of wiretap coding.
△ Less
Submitted 13 April, 2014;
originally announced April 2014.
-
Adaptive Real Time Selection for Quantum Key Distribution in Lossy and Turbulent Free-Space Channels
Authors:
Giuseppe Vallone,
Davide Marangon,
Matteo Canale,
Ilaria Savorgnan,
Davide Bacco,
Mauro Barbieri,
Simon Calimani,
Cesare Barbieri,
Nicola Laurenti,
Paolo Villoresi
Abstract:
Quantum Key Distribution (QKD) allows to share random keys between two users with unconditional security: the key is usually generated by exchanging a stream of photons. The long-term vision of QKD is represented by a quantum network, implemented by fiber and free-space links involving ground and/or satellites stations. The presence of the atmospheric turbulence represents an obstacle for free-spa…
▽ More
Quantum Key Distribution (QKD) allows to share random keys between two users with unconditional security: the key is usually generated by exchanging a stream of photons. The long-term vision of QKD is represented by a quantum network, implemented by fiber and free-space links involving ground and/or satellites stations. The presence of the atmospheric turbulence represents an obstacle for free-space quantum communications, due to the increase of optical losses. Here we introduce a method to exploit the atmospheric turbulence as a resource for QKD. An Adaptive Real Time Selection (ARTS) technique at the receiver allows to take advantage of the fluctuating transmissivity of the channel, giving rise to an increase of the secure key rate.
△ Less
Submitted 30 August, 2018; v1 submitted 4 April, 2014;
originally announced April 2014.
-
Parallel BCC with One Common and Two Confidential Messages and Imperfect CSIT
Authors:
Ahmed Benfarah,
Stefano Tomasin,
Nicola Laurenti
Abstract:
We consider a broadcast communication system over parallel sub-channels where the transmitter sends three messages: a common message to two users, and two confidential messages to each user which need to be kept secret from the other user. We assume partial channel state information at the transmitter (CSIT), stemming from noisy channel estimation. The first contribution of this paper is the chara…
▽ More
We consider a broadcast communication system over parallel sub-channels where the transmitter sends three messages: a common message to two users, and two confidential messages to each user which need to be kept secret from the other user. We assume partial channel state information at the transmitter (CSIT), stemming from noisy channel estimation. The first contribution of this paper is the characterization of the secrecy capacity region boundary as the solution of weighted sum-rate problems, with suitable weights. Partial CSIT is addressed by adding a margin to the estimated channel gains. The second paper contribution is the solution of this problem in an almost closed-form, where only two single real parameters must be optimized, e.g., through dichotomic searches. On the one hand, the considered problem generalizes existing literature where only two out of the three messages are transmitted. On the other hand, the solution finds also practical applications into the resource allocation of orthogonal frequency division multiplexing (OFDM) systems with both secrecy and fairness constraints.
△ Less
Submitted 20 January, 2015; v1 submitted 27 March, 2014;
originally announced March 2014.
-
Secret Message Transmission by HARQ with Multiple Encoding
Authors:
Stefano Tomasin,
Nicola Laurenti
Abstract:
Secure transmission between two agents, Alice and Bob, over block fading channels can be achieved similarly to conventional hybrid automatic repeat request (HARQ) by letting Alice transmit multiple blocks, each containing an encoded version of the secret message, until Bob informs Alice about successful decoding by a public error-free return channel. In existing literature each block is a differen…
▽ More
Secure transmission between two agents, Alice and Bob, over block fading channels can be achieved similarly to conventional hybrid automatic repeat request (HARQ) by letting Alice transmit multiple blocks, each containing an encoded version of the secret message, until Bob informs Alice about successful decoding by a public error-free return channel. In existing literature each block is a differently punctured version of a single codeword generated with a Wyner code that uses a common randomness for all blocks. In this paper instead we propose a more general approach where multiple codewords are generated from independent randomnesses. The class of channels for which decodability and secrecy is ensured is characterized, with derivations for the existence of secret codes. We show in particular that the classes are not a trivial subset (or superset) of those of existing schemes, thus highlighting the novelty of the proposed solution. The result is further confirmed by deriving the average achievable secrecy throughput, thus taking into account both decoding and secrecy outage.
△ Less
Submitted 14 January, 2014;
originally announced January 2014.
-
Adaptive Discrimination Scheme for Quantum Pulse Position Modulation Signals
Authors:
Nicola Dalla Pozza,
Nicola Laurenti
Abstract:
In the communication scenario, we consider the problem of the discrimination between the signals of the Quantum Pulse Position Modulation. We propose a receiver scheme that employs repeated local measurements in distinct temporal slots within the symbol time interval, adaptively chosen on the basis of the outcomes in the previous slots. By employing Dynamic Programming to optimize each measurement…
▽ More
In the communication scenario, we consider the problem of the discrimination between the signals of the Quantum Pulse Position Modulation. We propose a receiver scheme that employs repeated local measurements in distinct temporal slots within the symbol time interval, adaptively chosen on the basis of the outcomes in the previous slots. By employing Dynamic Programming to optimize each measurement, we approach the theoretical performance limit much closer than existing receiver schemes.
△ Less
Submitted 8 January, 2014; v1 submitted 29 June, 2013;
originally announced July 2013.
-
Optimal Binary Codes and Measurements for Classical Communication over Qubit Channels
Authors:
Nicola Dalla Pozza,
Nicola Laurenti,
Francesco Ticozzi
Abstract:
We propose constructive approaches for the optimization of binary classical communication over a general noisy qubit quantum channel, for both the error probability and the classical capacity functionals. After showing that the optimal measurements are always associated to orthogonal projections, we construct a parametrization of the achievable transition probabilities via the coherence vector rep…
▽ More
We propose constructive approaches for the optimization of binary classical communication over a general noisy qubit quantum channel, for both the error probability and the classical capacity functionals. After showing that the optimal measurements are always associated to orthogonal projections, we construct a parametrization of the achievable transition probabilities via the coherence vector representation. We are then able to rewrite the problem in a form that can be solved by standard, efficient numerical algorithms and provides insights on the form of the solutions.
△ Less
Submitted 8 January, 2014; v1 submitted 28 June, 2013;
originally announced July 2013.
-
Secrecy Transmission on Block Fading Channels: Theoretical Limits and Performance of Practical Codes
Authors:
Marco Baldi,
Marco Bianchi,
Franco Chiaraluce,
Nicola Laurenti,
Stefano Tomasin,
Francesco Renna
Abstract:
We consider a system where an agent (Alice) aims at transmitting a message to a second agent (Bob) over a set of parallel channels, while kee** it secret from a third agent (Eve) by using physical layer security techniques. We assume that Alice perfectly knows the set of channels with respect to Bob, but she has only a statistical knowledge of the channels with respect to Eve. We derive bounds o…
▽ More
We consider a system where an agent (Alice) aims at transmitting a message to a second agent (Bob) over a set of parallel channels, while kee** it secret from a third agent (Eve) by using physical layer security techniques. We assume that Alice perfectly knows the set of channels with respect to Bob, but she has only a statistical knowledge of the channels with respect to Eve. We derive bounds on the achievable outage secrecy rates, by considering coding either within each channel or across all parallel channels. Transmit power is adapted to the channel conditions, with a constraint on the average power over the whole transmission. We also focus on the maximum cumulative outage secrecy rate that can be achieved. Moreover, in order to assess the performance in a real life scenario, we consider the use of practical error correcting codes. We extend the definitions of security gap and equivocation rate, previously applied to the single additive white Gaussian noise channel, to Rayleigh distributed parallel channels, on the basis of the error rate targets and the outage probability. Bounds on these metrics are also derived, taking into account the statistics of the parallel channels. Numerical results are provided, that confirm the feasibility of the considered physical layer security techniques.
△ Less
Submitted 26 October, 2014; v1 submitted 14 May, 2013;
originally announced May 2013.
-
On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels
Authors:
Augusto Ferrante,
Nicola Laurenti,
Chiara Masiero,
Michele Pavon,
Stefano Tomasin
Abstract:
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We deriv…
▽ More
For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density whose correlation matrices may be obtained by solving a constrained optimization problem. We propose an iterative algorithm for its solution: Starting from the closed form solution of a relaxed problem, we obtain, by projection, an initial feasible solution; then, by an iterative procedure, we look for the fixed point solution of the problem. Numerical results show that for cases of interest the iterative approach converges, and perturbation analysis shows that the found solution is a local minimum.
△ Less
Submitted 18 April, 2014; v1 submitted 4 March, 2013;
originally announced March 2013.
-
Low-power Secret-key Agreement over OFDM
Authors:
Francesco Renna,
Nicola Laurenti,
Stefano Tomasin,
Marco Baldi,
Nicola Maturo,
Marco Bianchi,
Franco Chiaraluce,
Matthieu Bloch
Abstract:
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplif…
▽ More
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplifies the design of the randomness sharing scheme, even in a fading channel scenario. We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information reconciliation. Numerical results confirm the merits of the proposed approach as a feasible and practical solution. Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.
-
Exact Spectral Analysis of Single-h and Multi-h CPM Signals through PAM decomposition and Matrix Series Evaluation
Authors:
G. Cariolaro,
T. Erseghe,
N. Laurenti
Abstract:
In this paper we address the problem of closed-form spectral evaluation of CPM. We show that the multi-h CPM signal can be conveniently generated by a PTI SM. The output is governed by a Markov chain with the unusual peculiarity of being cyclostationary and reducible; this holds also in the single-h context. Judicious reinterpretation of the result leads to a formalization through a stationary a…
▽ More
In this paper we address the problem of closed-form spectral evaluation of CPM. We show that the multi-h CPM signal can be conveniently generated by a PTI SM. The output is governed by a Markov chain with the unusual peculiarity of being cyclostationary and reducible; this holds also in the single-h context. Judicious reinterpretation of the result leads to a formalization through a stationary and irreducible Markov chain, whose spectral evaluation is known in closed-form from the literature. Two are the major outcomes of this paper. First, unlike the literature, we obtain a PSD in true closed-form. Second, we give novel insights into the CPM format.
△ Less
Submitted 11 September, 2006;
originally announced September 2006.