Skip to main content

Showing 1–7 of 7 results for author: Schieler, C

.
  1. arXiv:2406.09572  [pdf

    astro-ph.IM

    High Data Rate Laser Communications for the Black Hole Explorer

    Authors: Jade Wang, Bryan Bilyeu, Don Boroson, Dave Caplan, Kat Riesing, Bryan Robinson, Curt Schieler, Michael D. Johnson, Lindy Blackburn, Kari Haworth, Janice Houston, Sara Issaoun, Daniel Palumbo, Elliot Richards, Ranjani Srinivasan, Jonathan Weintroub, Dan Marrone

    Abstract: The Black Hole Explorer (BHEX) is a mission concept that can dramatically improve state-of-the-art astronomical very long baseline interferometry (VLBI) imaging resolution by extending baseline distances to space. To support these scientific goals, a high data rate downlink is required from space to ground. Laser communications is a promising option for realizing these high data rate, long-distanc… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Submitted to SPIE Astronomical Telescopes + Instrumentation, 2024

  2. arXiv:1410.2881  [pdf, other

    cs.IT

    The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List

    Authors: Curt Schieler, Paul Cuff

    Abstract: We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this work we suppose that an eavesdropper produces a list of $2^{nR_{\sf L}}$ reconstruction sequences and measure secrecy by the minimum distortion o… ▽ More

    Submitted 23 November, 2014; v1 submitted 10 October, 2014; originally announced October 2014.

    Comments: Submitted to IEEE Transactions on Information Theory. Updated version with citation typo fixed

  3. arXiv:1307.7770  [pdf, ps, other

    cs.IT

    A Connection between Good Rate-distortion Codes and Backward DMCs

    Authors: Curt Schieler, Paul Cuff

    Abstract: Let $X^n\in\mathcal{X}^n$ be a sequence drawn from a discrete memoryless source, and let $Y^n\in\mathcal{Y}^n$ be the corresponding reconstruction sequence that is output by a good rate-distortion code. This paper establishes a property of the joint distribution of $(X^n,Y^n)$. It is shown that for $D>0$, the input-output statistics of a $R(D)$-achieving rate-distortion code converge (in normalize… ▽ More

    Submitted 29 July, 2013; originally announced July 2013.

    Comments: ITW 2013, 5 pages

  4. arXiv:1305.3905  [pdf, other

    cs.IT cs.CR

    Rate-Distortion Theory for Secrecy Systems

    Authors: Curt Schieler, Paul Cuff

    Abstract: Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, t… ▽ More

    Submitted 10 October, 2014; v1 submitted 16 May, 2013; originally announced May 2013.

    Comments: Update version, to appear in IEEE Transactions on Information Theory

    Journal ref: IEEE Trans. on Inf. Theory, 60(12):7584-605, December, 2014

  5. arXiv:1210.1549  [pdf, ps, other

    cs.IT

    Source-Channel Secrecy with Causal Disclosure

    Authors: Curt Schieler, Eva C. Song, Paul Cuff, H. Vincent Poor

    Abstract: Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consists of a source and a broadcast (wiretap) channel, and lossless reproduction of the source sequence at the legitimate receiver is required. A key aspec… ▽ More

    Submitted 6 October, 2012; v1 submitted 4 October, 2012; originally announced October 2012.

    Comments: Allerton 2012, 6 pages. Updated version includes acknowledgements

  6. arXiv:1205.3853  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Is Cheap if the Adversary Must Reconstruct

    Authors: Curt Schieler, Paul Cuff

    Abstract: A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here we show that when an eavesdropper attempts to reconstruct an information sequence, as posed in the literature by Yamamoto, very little secret key is… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

    Comments: ISIT 2012, 5 pages

  7. arXiv:1110.0425  [pdf, other

    cs.IT

    Hybrid Codes Needed for Coordination over the Point-to-Point Channel

    Authors: Paul Cuff, Curt Schieler

    Abstract: We consider a new fundamental question regarding the point-to-point memoryless channel. The source-channel separation theorem indicates that random codebook construction for lossy source compression and channel coding can be independently constructed and paired to achieve optimal performance for coordinating a source sequence with a reconstruction sequence. But what if we want the channel input to… ▽ More

    Submitted 3 October, 2011; originally announced October 2011.

    Comments: Allerton 2011, 5 pages, 1 figure, uses IEEEtran.cls