-
High Data Rate Laser Communications for the Black Hole Explorer
Authors:
Jade Wang,
Bryan Bilyeu,
Don Boroson,
Dave Caplan,
Kat Riesing,
Bryan Robinson,
Curt Schieler,
Michael D. Johnson,
Lindy Blackburn,
Kari Haworth,
Janice Houston,
Sara Issaoun,
Daniel Palumbo,
Elliot Richards,
Ranjani Srinivasan,
Jonathan Weintroub,
Dan Marrone
Abstract:
The Black Hole Explorer (BHEX) is a mission concept that can dramatically improve state-of-the-art astronomical very long baseline interferometry (VLBI) imaging resolution by extending baseline distances to space. To support these scientific goals, a high data rate downlink is required from space to ground. Laser communications is a promising option for realizing these high data rate, long-distanc…
▽ More
The Black Hole Explorer (BHEX) is a mission concept that can dramatically improve state-of-the-art astronomical very long baseline interferometry (VLBI) imaging resolution by extending baseline distances to space. To support these scientific goals, a high data rate downlink is required from space to ground. Laser communications is a promising option for realizing these high data rate, long-distance space-to-ground downlinks with smaller space/ground apertures. Here, we present a scalable laser communications downlink design and current lasercom mission results.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List
Authors:
Curt Schieler,
Paul Cuff
Abstract:
We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this work we suppose that an eavesdropper produces a list of $2^{nR_{\sf L}}$ reconstruction sequences and measure secrecy by the minimum distortion o…
▽ More
We introduce a new measure of information-theoretic secrecy based on rate-distortion theory and study it in the context of the Shannon cipher system. Whereas rate-distortion theory is traditionally concerned with a single reconstruction sequence, in this work we suppose that an eavesdropper produces a list of $2^{nR_{\sf L}}$ reconstruction sequences and measure secrecy by the minimum distortion over the entire list. We show that this setting is equivalent to one in which an eavesdropper must reconstruct a single sequence, but also receives side information about the source sequence and public message from a rate-limited henchman (a helper for an adversary). We characterize the optimal tradeoff of secret key rate, list rate, and eavesdropper distortion. The solution hinges on a problem of independent interest: lossy compression of a codeword drawn uniformly from a random codebook. We also characterize the solution to the lossy communication version of the problem in which distortion is allowed at the legitimate receiver. The analysis in both settings is greatly aided by a recent technique for proving source coding results with the use of a likelihood encoder.
△ Less
Submitted 23 November, 2014; v1 submitted 10 October, 2014;
originally announced October 2014.
-
A Connection between Good Rate-distortion Codes and Backward DMCs
Authors:
Curt Schieler,
Paul Cuff
Abstract:
Let $X^n\in\mathcal{X}^n$ be a sequence drawn from a discrete memoryless source, and let $Y^n\in\mathcal{Y}^n$ be the corresponding reconstruction sequence that is output by a good rate-distortion code. This paper establishes a property of the joint distribution of $(X^n,Y^n)$. It is shown that for $D>0$, the input-output statistics of a $R(D)$-achieving rate-distortion code converge (in normalize…
▽ More
Let $X^n\in\mathcal{X}^n$ be a sequence drawn from a discrete memoryless source, and let $Y^n\in\mathcal{Y}^n$ be the corresponding reconstruction sequence that is output by a good rate-distortion code. This paper establishes a property of the joint distribution of $(X^n,Y^n)$. It is shown that for $D>0$, the input-output statistics of a $R(D)$-achieving rate-distortion code converge (in normalized relative entropy) to the output-input statistics of a discrete memoryless channel (dmc). The dmc is "backward" in that it is a channel from the reconstruction space $\mathcal{Y}^n$ to source space $\mathcal{X}^n$. It is also shown that the property does not necessarily hold when normalized relative entropy is replaced by variational distance.
△ Less
Submitted 29 July, 2013;
originally announced July 2013.
-
Rate-Distortion Theory for Secrecy Systems
Authors:
Curt Schieler,
Paul Cuff
Abstract:
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, t…
▽ More
Secrecy in communication systems is measured herein by the distortion that an adversary incurs. The transmitter and receiver share secret key, which they use to encrypt communication and ensure distortion at an adversary. A model is considered in which an adversary not only intercepts the communication from the transmitter to the receiver, but also potentially has side information. Specifically, the adversary may have causal or noncausal access to a signal that is correlated with the source sequence or the receiver's reconstruction sequence. The main contribution is the characterization of the optimal tradeoff among communication rate, secret key rate, distortion at the adversary, and distortion at the legitimate receiver. It is demonstrated that causal side information at the adversary plays a pivotal role in this tradeoff. It is also shown that measures of secrecy based on normalized equivocation are a special case of the framework.
△ Less
Submitted 10 October, 2014; v1 submitted 16 May, 2013;
originally announced May 2013.
-
Source-Channel Secrecy with Causal Disclosure
Authors:
Curt Schieler,
Eva C. Song,
Paul Cuff,
H. Vincent Poor
Abstract:
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consists of a source and a broadcast (wiretap) channel, and lossless reproduction of the source sequence at the legitimate receiver is required. A key aspec…
▽ More
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined. The communication system consists of a source and a broadcast (wiretap) channel, and lossless reproduction of the source sequence at the legitimate receiver is required. A key aspect of this model is that the eavesdropper's actions are allowed to depend on the past behavior of the system. Achievability results are obtained by studying the performance of source and channel coding operations separately, and then linking them together digitally. Although the problem addressed here has been solved when the secrecy resource is shared secret key, it is found that substituting secret key for a wiretap channel brings new insights and challenges: the notion of weak secrecy provides just as much distortion at the eavesdropper as strong secrecy, and revealing public messages freely is detrimental.
△ Less
Submitted 6 October, 2012; v1 submitted 4 October, 2012;
originally announced October 2012.
-
Secrecy Is Cheap if the Adversary Must Reconstruct
Authors:
Curt Schieler,
Paul Cuff
Abstract:
A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here we show that when an eavesdropper attempts to reconstruct an information sequence, as posed in the literature by Yamamoto, very little secret key is…
▽ More
A secret key can be used to conceal information from an eavesdropper during communication, as in Shannon's cipher system. Most theoretical guarantees of secrecy require the secret key space to grow exponentially with the length of communication. Here we show that when an eavesdropper attempts to reconstruct an information sequence, as posed in the literature by Yamamoto, very little secret key is required to effect unconditionally maximal distortion; specifically, we only need the secret key space to increase unboundedly, growing arbitrarily slowly with the blocklength. As a corollary, even with a secret key of constant size we can still cause the adversary arbitrarily close to maximal distortion, regardless of the length of the information sequence.
△ Less
Submitted 17 May, 2012;
originally announced May 2012.
-
Hybrid Codes Needed for Coordination over the Point-to-Point Channel
Authors:
Paul Cuff,
Curt Schieler
Abstract:
We consider a new fundamental question regarding the point-to-point memoryless channel. The source-channel separation theorem indicates that random codebook construction for lossy source compression and channel coding can be independently constructed and paired to achieve optimal performance for coordinating a source sequence with a reconstruction sequence. But what if we want the channel input to…
▽ More
We consider a new fundamental question regarding the point-to-point memoryless channel. The source-channel separation theorem indicates that random codebook construction for lossy source compression and channel coding can be independently constructed and paired to achieve optimal performance for coordinating a source sequence with a reconstruction sequence. But what if we want the channel input to also be coordinated with the source and reconstruction? Such situations arise in network communication problems, where the correlation inherent in the information sources can be used to correlate channel inputs.
Hybrid codes have been shown to be useful in a number of network communication problems. In this work we highlight their advantages over purely digital codebook construction by applying them to the point-to-point setting, coordinating both the channel input and the reconstruction with the source.
△ Less
Submitted 3 October, 2011;
originally announced October 2011.