Skip to main content

Showing 1–6 of 6 results for author: Sharififar, A

.
  1. arXiv:2201.10057  [pdf, ps, other

    cs.IT

    On the Optimality of Linear Index Coding over the Fields with Characteristic Three

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: It has been known that the insufficiency of linear coding in achieving the optimal rate of the general index coding problem is rooted in its rate's dependency on the field size. However, this dependency has been described only through the two well-known matroid instances, namely the Fano and non-Fano matroids, which, in turn, limits its scope only to the fields with characteristic two. In this pap… ▽ More

    Submitted 1 May, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

  2. arXiv:2105.07211  [pdf, other

    cs.IT

    On Converse Results for Secure Index Coding

    Authors: Yucheng Liu, Lawrence Ong, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar

    Abstract: In this work, we study the secure index coding problem where there are security constraints on both legitimate receivers and eavesdroppers. We develop two performance bounds (i.e., converse results) on the symmetric secure capacity. The first one is an extended version of the basic acyclic chain bound (Liu and Sadeghi, 2019) that takes security constraints into account. The second converse result… ▽ More

    Submitted 15 May, 2021; originally announced May 2021.

    Comments: A shortened version submitted to IEEE Information Theory Workshop (ITW) 2021

  3. arXiv:2102.01526  [pdf, ps, other

    cs.IT

    Broadcast Rate Requires Nonlinear Coding in a Unicast Index Coding Instance of Size 36

    Authors: Arman Sharififar, Parastoo Sadeghi, Neda Aboutorab

    Abstract: Insufficiency of linear coding for the network coding problem was first proved by providing an instance which is solvable only by nonlinear network coding (Dougherty et al., 2005).Based on the work of Effros, et al., 2015, this specific network coding instance can be modeled as a groupcast index coding (GIC)instance with 74 messages and 80 users (where a message can be requested by multiple users)… ▽ More

    Submitted 5 February, 2023; v1 submitted 2 February, 2021; originally announced February 2021.

  4. arXiv:2101.08970  [pdf, other

    cs.IT

    An Update-based Maximum Column Distance Coding Scheme for Index Coding

    Authors: Arman Sharififar, Neda Aboutorab, Parastoo Sadeghi

    Abstract: In this paper, we propose a new scalar linear coding scheme for the index coding problem called update-based maximum column distance (UMCD) coding scheme. The central idea in each transmission is to code messages such that one of the receivers with the minimum size of side information is instantaneously eliminated from unsatisfied receivers. One main contribution of the paper is to prove that the… ▽ More

    Submitted 5 February, 2023; v1 submitted 22 January, 2021; originally announced January 2021.

  5. arXiv:2004.02076  [pdf, ps, other

    cs.IT

    Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem

    Authors: Arman Sharififar, Neda Aboutorab, Yucheng Liu, Parastoo Sadeghi

    Abstract: The groupcast index coding (GIC) problem is a generalization of the index coding problem, where one packet can be demanded by multiple users. In this paper, we propose a new coding scheme called independent user partition multicast (IUPM) for the GIC problem. The novelty of this scheme compared to the user partition multicast (UPM) (Shanmugam \textit{et al.}, 2015) is in removing redundancies in t… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

  6. arXiv:2001.07296  [pdf, ps, other

    cs.IT

    Secure Index Coding with Security Constraints on Receivers

    Authors: Yucheng Liu, Parastoo Sadeghi, Neda Aboutorab, Arman Sharififar

    Abstract: Index coding is concerned with efficient broadcast of a set of messages to receivers in the presence of receiver side information. In this paper, we study the secure index coding problem with security constraints on the receivers themselves. That is, for each receiver there is a single legitimate message it needs to decode and a prohibited message list, none of which should be decoded by that rece… ▽ More

    Submitted 15 April, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

    Comments: 6 pages; a shorted version submitted to the International Symposium on Information Theory and Its Applications (ISITA) 2020