-
Simultaneous Computation and Communication over MAC
Authors:
Matthias Frey,
Igor Bjelaković,
Michael C. Gastpar,
**gge Zhu
Abstract:
We study communication over a Gaussian multiple-access channel (MAC) with two types of transmitters: Digital transmitters hold a message from a discrete set that needs to be communicated to the receiver with vanishing error probability. Analog transmitters hold sequences of analog values, and some functions of these distributed values (but not the values themselves) need to be conveyed to the rece…
▽ More
We study communication over a Gaussian multiple-access channel (MAC) with two types of transmitters: Digital transmitters hold a message from a discrete set that needs to be communicated to the receiver with vanishing error probability. Analog transmitters hold sequences of analog values, and some functions of these distributed values (but not the values themselves) need to be conveyed to the receiver, subject to a fidelity criterion such as mean squared error (MSE) or a certain maximum error with given confidence. For the case in which the computed function for the analog transmitters is a sum of values in [-1,1], we derive inner and outer bounds for the tradeoff of digital and analog rates of communication under peak and average power constraints for digital transmitters and a peak power constraint for analog transmitters. We then extend the achievability result to a class of functions that includes all linear and some non-linear functions. The practicality of our proposed communication scheme is shown in channel simulations that use a version of the scheme based on low density parity check (LDPC) coding and evaluate the system performance for different block lengths and Gaussian as well as non-Gaussian noise distributions.
△ Less
Submitted 23 April, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
A Learning-Based Approach to Approximate Coded Computation
Authors:
Navneet Agrawal,
Yuqin Qiu,
Matthias Frey,
Igor Bjelakovic,
Setareh Maghsudi,
Slawomir Stanczak,
**gge Zhu
Abstract:
Lagrange coded computation (LCC) is essential to solving problems about matrix polynomials in a coded distributed fashion; nevertheless, it can only solve the problems that are representable as matrix polynomials. In this paper, we propose AICC, an AI-aided learning approach that is inspired by LCC but also uses deep neural networks (DNNs). It is appropriate for coded computation of more general f…
▽ More
Lagrange coded computation (LCC) is essential to solving problems about matrix polynomials in a coded distributed fashion; nevertheless, it can only solve the problems that are representable as matrix polynomials. In this paper, we propose AICC, an AI-aided learning approach that is inspired by LCC but also uses deep neural networks (DNNs). It is appropriate for coded computation of more general functions. Numerical simulations demonstrate the suitability of the proposed approach for the coded computation of different matrix functions that are often utilized in digital signal processing.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
Semantic Security with Infinite Dimensional Quantum Eavesdrop** Channel
Authors:
Matthias Frey,
Igor Bjelaković,
Janis Nötzel,
Sławomir Stańczak
Abstract:
We propose a new proof method for direct coding theorems for wiretap channels where the eavesdropper has access to a quantum version of the transmitted signal on an infinite-dimensional Hilbert space and the legitimate parties communicate through a classical channel or a classical input, quantum output (cq) channel. The transmitter input can be subject to an additive cost constraint, which special…
▽ More
We propose a new proof method for direct coding theorems for wiretap channels where the eavesdropper has access to a quantum version of the transmitted signal on an infinite-dimensional Hilbert space and the legitimate parties communicate through a classical channel or a classical input, quantum output (cq) channel. The transmitter input can be subject to an additive cost constraint, which specializes to the case of an average energy constraint. This method yields errors that decay exponentially with increasing block lengths. Moreover, it provides a guarantee of a quantum version of semantic security, which is an established concept in classical cryptography and physical layer security. Therefore, it complements existing works which either do not prove the exponential error decay or use weaker notions of security. The main part of this proof method is a direct coding result on channel resolvability which states that there is only a doubly exponentially small probability that a standard random codebook does not solve the channel resolvability problem for the cq channel. Semantic security has strong operational implications meaning essentially that the eavesdropper cannot use its quantum observation to gather any meaningful information about the transmitted signal. We also discuss the connections between semantic security and various other established notions of secrecy.
△ Less
Submitted 5 June, 2023; v1 submitted 16 May, 2022;
originally announced May 2022.
-
Open or not open: Are conventional radio access networks more secure and trustworthy than Open-RAN?
Authors:
Felix Klement,
Stefan Katzenbeisser,
Vincent Ulitzsch,
Juliane Krämer,
Slawomir Stanczak,
Zoran Utkovski,
Igor Bjelakovic,
Gerhard Wunder
Abstract:
The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open…
▽ More
The Open RAN architecture is a promising and future-oriented architecture. It is intended to open up the radio access network (RAN) and enable more innovation and competition in the market. This will lead to RANs for current 5G networks, but especially for future 6G networks, evolving from the current highly integrated, vendor-specific RAN architecture towards disaggregated architectures with open interfaces that will enable to better tailor RAN solutions to the requirements of 5G and 6G applications. However, the introduction of such an open architecture substantially broadens the attack possibilities when compared to conventional RANs. In the past, this has often led to negative headlines that in summary have associated Open RAN with faulty or inadequate security. In this paper, we analyze what components are involved in an Open RAN deployment, how to assess the current state of security, and what measures need to be taken to ensure secure operation.
△ Less
Submitted 22 June, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Unsupervised Domain Adaptation across FMCW Radar Configurations Using Margin Disparity Discrepancy
Authors:
Rodrigo Hernangomez,
Igor Bjelakovic,
Lorenzo Servadei,
Slawomir Stanczak
Abstract:
Commercial radar sensing is gaining relevance and machine learning algorithms constitute one of the key components that are enabling the spread of this radio technology into areas like surveillance or healthcare. However, radar datasets are still scarce and generalization cannot be yet achieved for all radar systems, environment conditions or design parameters. A certain degree of fine tuning is,…
▽ More
Commercial radar sensing is gaining relevance and machine learning algorithms constitute one of the key components that are enabling the spread of this radio technology into areas like surveillance or healthcare. However, radar datasets are still scarce and generalization cannot be yet achieved for all radar systems, environment conditions or design parameters. A certain degree of fine tuning is, therefore, usually required to deploy machine-learning-enabled radar applications. In this work, we consider the problem of unsupervised domain adaptation across radar configurations in the context of deep-learning human activity classification using frequency-modulated continuous-wave. For that, we focus on the theory-inspired technique of Margin Disparity Discrepancy, which has already been proved successful in the area of computer vision. Our experiments extend this technique to radar data, achieving a comparable accuracy to fewshot supervised approaches for the same classification problem.
△ Less
Submitted 7 June, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
Over-The-Air Computation in Correlated Channels
Authors:
Matthias Frey,
Igor Bjelakovic,
Slawomir Stanczak
Abstract:
This paper addresses the problem of Over-The-Air (OTA) computation in wireless networks which has the potential to realize huge efficiency gains for instance in training of distributed ML models. We provide non-asymptotic, theoretical guarantees for OTA computation in fast-fading wireless channels where the fading and noise may be correlated. The distributions of fading and noise are not restricte…
▽ More
This paper addresses the problem of Over-The-Air (OTA) computation in wireless networks which has the potential to realize huge efficiency gains for instance in training of distributed ML models. We provide non-asymptotic, theoretical guarantees for OTA computation in fast-fading wireless channels where the fading and noise may be correlated. The distributions of fading and noise are not restricted to Gaussian distributions, but instead are assumed to follow a distribution in the more general sub-gaussian class. Furthermore, our result does not make any assumptions on the distribution of the sources and therefore, it can, e.g., be applied to arbitrarily correlated sources. We illustrate our analysis with numerical evaluations for OTA computation of two example functions in large wireless networks: the arithmetic mean and the Euclidean norm.
△ Less
Submitted 12 January, 2021;
originally announced January 2021.
-
Over-The-Air Computation in Correlated Channels
Authors:
Matthias Frey,
Igor Bjelakovic,
Slawomir Stanczak
Abstract:
Over-the-Air (OTA) computation is the problem of computing functions of distributed data without transmitting the entirety of the data to a central point. By avoiding such costly transmissions, OTA computation schemes can achieve a better-than-linear (depending on the function, often logarithmic or even constant) scaling of the communication cost as the number of transmitters grows. Among the most…
▽ More
Over-the-Air (OTA) computation is the problem of computing functions of distributed data without transmitting the entirety of the data to a central point. By avoiding such costly transmissions, OTA computation schemes can achieve a better-than-linear (depending on the function, often logarithmic or even constant) scaling of the communication cost as the number of transmitters grows. Among the most common functions computed OTA are linear functions such as weighted sums. In this work, we propose and analyze an analog OTA computation scheme for a class of functions that contains linear functions as well as some nonlinear functions such as $p$-norms of vectors. We prove error bound guarantees that are valid for fast-fading channels and all distributions of fading and noise contained in the class of sub-Gaussian distributions. This class includes Gaussian distributions, but also many other practically relevant cases such as Class A Middleton noise and fading with dominant line-of-sight components. In addition, there can be correlations in the fading and noise so that the presented results also apply to, for example, block fading channels and channels with bursty interference. We do not rely on any stochastic characterization of the distributed arguments of the OTA computed function; in particular, there is no assumption that these arguments are drawn from identical or independent probability distributions. Our analysis is nonasymptotic and therefore provides error bounds that are valid for a finite number of channel uses. OTA computation has a huge potential for reducing communication cost in applications such as Machine Learning (ML)-based distributed anomaly detection in large wireless sensor networks. We illustrate this potential through extensive numerical simulations.
△ Less
Submitted 17 August, 2021; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Towards Secure Over-The-Air Computation
Authors:
Matthias Frey,
Igor Bjelaković,
Sławomir Stańczak
Abstract:
We propose a new method to protect Over-The-Air (OTA) computation schemes against passive eavesdrop**. Our method uses a friendly jammer whose signal is -- contrary to common intuition -- stronger at the legitimate receiver than it is at the eavesdropper. We focus on the computation of arithmetic averages over an OTA channel. The derived secrecy guarantee translates to a lower bound on the eaves…
▽ More
We propose a new method to protect Over-The-Air (OTA) computation schemes against passive eavesdrop**. Our method uses a friendly jammer whose signal is -- contrary to common intuition -- stronger at the legitimate receiver than it is at the eavesdropper. We focus on the computation of arithmetic averages over an OTA channel. The derived secrecy guarantee translates to a lower bound on the eavesdropper's mean square error while the question of how to provide operationally more significant guarantees such as semantic security remains open for future work. The key ingredients in proving the security guarantees are a known result on channel resolvability and a generalization of existing achievability results on coding for compound channels.
△ Less
Submitted 15 March, 2024; v1 submitted 9 January, 2020;
originally announced January 2020.
-
Distributed Approximation of Functions over Fast Fading Channels with Applications to Distributed Learning and the Max-Consensus Problem
Authors:
Igor Bjelakovic,
Matthias Frey,
Slawomir Stanczak
Abstract:
In this work, we consider the problem of distributed approximation of functions over multiple-access channels with additive noise. In contrast to previous works, we take fast fading into account and give explicit probability bounds for the approximation error allowing us to derive bounds on the number of channel uses that are needed to approximate a function up to a given approximation accuracy. N…
▽ More
In this work, we consider the problem of distributed approximation of functions over multiple-access channels with additive noise. In contrast to previous works, we take fast fading into account and give explicit probability bounds for the approximation error allowing us to derive bounds on the number of channel uses that are needed to approximate a function up to a given approximation accuracy. Neither the fading nor the noise process is limited to Gaussian distributions. Instead, we consider sub-gaussian random variables which include Gaussian as well as many other distributions of practical relevance. The results are motivated by and have immediate applications to a) computing predictors in models for distributed machine learning and b) the max-consensus problem in ultra-dense networks.
△ Less
Submitted 21 September, 2019; v1 submitted 8 July, 2019;
originally announced July 2019.
-
Resolvability on Continuous Alphabets
Authors:
Matthias Frey,
Igor Bjelaković,
Sławomir Stańczak
Abstract:
We characterize the resolvability region for a large class of point-to-point channels with continuous alphabets. In our direct result, we prove not only the existence of good resolvability codebooks, but adapt an approach based on the Chernoff-Hoeffding bound to the continuous case showing that the probability of drawing an unsuitable codebook is doubly exponentially small. For the converse part,…
▽ More
We characterize the resolvability region for a large class of point-to-point channels with continuous alphabets. In our direct result, we prove not only the existence of good resolvability codebooks, but adapt an approach based on the Chernoff-Hoeffding bound to the continuous case showing that the probability of drawing an unsuitable codebook is doubly exponentially small. For the converse part, we show that our previous elementary result carries over to the continuous case easily under some mild continuity assumption.
△ Less
Submitted 9 May, 2018; v1 submitted 11 January, 2018;
originally announced January 2018.
-
The MAC Resolvability Region, Semantic Security and Its Operational Implications
Authors:
Matthias Frey,
Igor Bjelakovic,
Slawomir Stanczak
Abstract:
Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. In particular, we refine and extend the proof to obtain novel results on the second-order achievable rates. Then we characterize the resolvability region of the memoryless MAC by establishing a conceptually si…
▽ More
Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel (MAC) from the perspective of resolvability. In particular, we refine and extend the proof to obtain novel results on the second-order achievable rates. Then we characterize the resolvability region of the memoryless MAC by establishing a conceptually simple converse proof for resolvability that relies on the uniform continuity of Shannon's entropy with respect to the variational distance. We discuss the operational meaning of the information theoretic concept of semantic security from the viewpoint of Ahlswede's General Theory of Information Transfer and show interesting implications on the resilience against a large class of attacks even if no assumption can be made about the distributions of the transmitted messages. Finally we provide details on how the resolvability results can be used to construct a wiretap code that achieves semantic security.
△ Less
Submitted 22 January, 2018; v1 submitted 6 October, 2017;
originally announced October 2017.
-
MAC Resolvability: First And Second Order Results
Authors:
Matthias Frey,
Igor Bjelakovic,
Slawomir Stanczak
Abstract:
Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel from the perspective of resolvability. We then refine the approach in order to obtain some novel results on the second-order achievable rates.
Building upon previous work on the relation between secrecy and channel resolvability, we revisit a secrecy proof for the multiple-access channel from the perspective of resolvability. We then refine the approach in order to obtain some novel results on the second-order achievable rates.
△ Less
Submitted 28 September, 2017; v1 submitted 13 July, 2017;
originally announced July 2017.
-
User Activity Detection via Group Testing and Coded Computation
Authors:
Matthias Frey,
Igor Bjelaković,
Sławomir Stańczak
Abstract:
Inspired by group testing algorithms and the coded computation paradigm, we propose and analyze a novel multiple access scheme for detecting active users in large-scale networks. The scheme consists of a simple randomized detection algorithm that uses computation coding as intermediate steps for computing logical disjunction functions over the multiple access channel (MAC). First we show that give…
▽ More
Inspired by group testing algorithms and the coded computation paradigm, we propose and analyze a novel multiple access scheme for detecting active users in large-scale networks. The scheme consists of a simple randomized detection algorithm that uses computation coding as intermediate steps for computing logical disjunction functions over the multiple access channel (MAC). First we show that given an efficient MAC code for disjunction computation the algorithm requires $O(k \log (\frac{N}{k }))$ decision steps for detecting $k$ active users out of $N+k$ users. Subsequently we present a simple suboptimal code for a class of MACs with arbitrarily varying sub-gaussian noise that uniformly requires $O (k \log (N) \max \{ \log k , \log \log N \} )$ channel uses for solving the activity detection problem. This shows that even in the presence of noise an efficient detection of active users is possible. Our approach reveals that the true crux of the matter lies in constructing efficient codes for computing disjunctions over a MAC.
△ Less
Submitted 23 January, 2017;
originally announced January 2017.
-
Strong Secrecy and Stealth for Broadcast Channels with Confidential Messages
Authors:
Igor Bjelakovic,
Jafar Mohammadi,
Sławomir Stańczak
Abstract:
We consider a discrete memoryless broadcast channel consists of two users and a sender. The sender has two independent confidential messages for each user. We extend the work of Liu et al.\ on broadcast channels with two confidential messages with weak secrecy criterion to strong secrecy. Our results are based on an extension of the techniques developed by Hou and Kramer on bounding Kullback-Leibl…
▽ More
We consider a discrete memoryless broadcast channel consists of two users and a sender. The sender has two independent confidential messages for each user. We extend the work of Liu et al.\ on broadcast channels with two confidential messages with weak secrecy criterion to strong secrecy. Our results are based on an extension of the techniques developed by Hou and Kramer on bounding Kullback-Leibler divergence in context of \textit{resolvability} and \textit{effective secrecy}.
△ Less
Submitted 1 February, 2016; v1 submitted 30 October, 2015;
originally announced October 2015.
-
Arbitrarily varying and compound classical-quantum channels and a note on quantum zero-error capacities
Authors:
Igor Bjelaković,
Holger Boche,
Gisbert Janßen,
Janis Nötzel
Abstract:
We consider compound as well as arbitrarily varying classical-quantum channel models. For classical-quantum compound channels, we give an elementary proof of the direct part of the coding theorem. A weak converse under average error criterion to this statement is also established. We use this result together with the robustification and elimination technique developed by Ahlswede in order to give…
▽ More
We consider compound as well as arbitrarily varying classical-quantum channel models. For classical-quantum compound channels, we give an elementary proof of the direct part of the coding theorem. A weak converse under average error criterion to this statement is also established. We use this result together with the robustification and elimination technique developed by Ahlswede in order to give an alternative proof of the direct part of the coding theorem for a finite classical-quantum arbitrarily varying channels with the criterion of success being average error probability. Moreover we provide a proof of the strong converse to the random coding capacity in this setting.The notion of symmetrizability for the maximal error probability is defined and it is shown to be both necessary and sufficient for the capacity for message transmission with maximal error probability criterion to equal zero. Finally, it is shown that the connection between zero-error capacity and certain arbitrarily varying channels is, just like in the case of quantum channels, only partially valid for classical-quantum channels.
△ Less
Submitted 28 September, 2012; v1 submitted 27 September, 2012;
originally announced September 2012.
-
Capacity Results for Arbitrarily Varying Wiretap Channels
Authors:
Igor Bjelaković,
Holger Boche,
Jochen Sommerfeld
Abstract:
In this work the arbitrarily varying wiretap channel AVWC is studied. We derive a lower bound on the random code secrecy capacity for the average error criterion and the strong secrecy criterion in the case of a best channel to the eavesdropper by using Ahlswede's robustification technique for ordinary AVCs. We show that in the case of a non-symmetrisable channel to the legitimate receiver the det…
▽ More
In this work the arbitrarily varying wiretap channel AVWC is studied. We derive a lower bound on the random code secrecy capacity for the average error criterion and the strong secrecy criterion in the case of a best channel to the eavesdropper by using Ahlswede's robustification technique for ordinary AVCs. We show that in the case of a non-symmetrisable channel to the legitimate receiver the deterministic code secrecy capacity equals the random code secrecy capacity, a result similar to Ahlswede's dichotomy result for ordinary AVCs. Using this we can derive that the lower bound is also valid for the deterministic code capacity of the AVWC. The proof of the dichotomy result is based on the elimination technique introduced by Ahlswede for ordinary AVCs. We further prove upper bounds on the deterministic code secrecy capacity in the general case, which results in a multi-letter expression for the secrecy capacity in the case of a best channel to the eavesdropper. Using techniques of Ahlswede, developed to guarantee the validity of a reliability criterion, the main contribution of this work is to integrate the strong secrecy criterion into these techniques.
△ Less
Submitted 24 September, 2012;
originally announced September 2012.
-
Secrecy Results for Compound Wiretap Channels
Authors:
Igor Bjelakovic,
Holger Boche,
Jochen Sommerfeld
Abstract:
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a stronger secrecy criterion and the maximum error probability criteri…
▽ More
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a stronger secrecy criterion and the maximum error probability criterion, and with a decoder that is robust against the effect of randomisation in the encoding. This relieves us from the need of decoding the randomisation parameter which is in general not possible within this model. Moreover we prove a lower bound on the secrecy capacity of the compound wiretap channel without channel state information and derive a multi-letter expression for the capacity in this communication scenario.
△ Less
Submitted 25 November, 2012; v1 submitted 10 June, 2011;
originally announced June 2011.
-
Capacity results for compound wiretap channels
Authors:
Igor Bjelaković,
Holger Boche,
Jochen Sommerfeld
Abstract:
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a quite strong secrecy criterion and with a decoder that is robust aga…
▽ More
We derive a lower bound on the secrecy capacity of the compound wiretap channel with channel state information at the transmitter which matches the general upper bound on the secrecy capacity of general compound wiretap channels given by Liang et al. and thus establishing a full coding theorem in this case. We achieve this with a quite strong secrecy criterion and with a decoder that is robust against the effect of randomisation in the encoding. This relieves us from the need of decoding the randomisation parameter which is in general not possible within this model. Moreover we prove a lower bound on the secrecy capacity of the compound wiretap channel without channel state information.
△ Less
Submitted 9 August, 2011; v1 submitted 1 March, 2011;
originally announced March 2011.
-
Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels
Authors:
Rudolf Ahlswede,
Igor Bjelakovic,
Holger Boche,
Janis Noetzel
Abstract:
We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a…
▽ More
We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes a regularized formula for the common randomness-assisted capacity for entanglement transmission of an AVQC. Quite surprisingly and in contrast to the classical analog of the problem involving the maximal and average error probability, we find that the capacity for entanglement transmission of an AVQC always equals its strong subspace transmission capacity. These results are accompanied by different notions of symmetrizability (zero-capacity conditions) as well as by conditions for an AVQC to have a capacity described by a single-letter formula. In he final part of the paper the capacity of the erasure-AVQC is computed and some light shed on the connection between AVQCs and zero-error capacities. Additionally, we show by entirely elementary and operational arguments motivated by the theory of AVQCs that the quantum, classical, and entanglement-assisted zero-error capacities of quantum channels are generically zero and are discontinuous at every positivity point.
△ Less
Submitted 10 December, 2012; v1 submitted 3 October, 2010;
originally announced October 2010.
-
The Compound Multiple Access Channel with Partially Cooperating Encoders
Authors:
Moritz Wiese,
Holger Boche,
Igor Bjelaković,
Volker Jungnickel
Abstract:
The goal of this paper is to provide a rigorous information-theoretic analysis of subnetworks of interference networks. We prove two coding theorems for the compound multiple-access channel with an arbitrary number of channel states. The channel state information at the transmitters is such that each transmitter has a finite partition of the set of states and knows which element of the partition t…
▽ More
The goal of this paper is to provide a rigorous information-theoretic analysis of subnetworks of interference networks. We prove two coding theorems for the compound multiple-access channel with an arbitrary number of channel states. The channel state information at the transmitters is such that each transmitter has a finite partition of the set of states and knows which element of the partition the actual state belongs to. The receiver may have arbitrary channel state information. The first coding theorem is for the case that both transmitters have a common message and that each has an additional common message. The second coding theorem is for the case where rate-constrained, but noiseless transmitter cooperation is possible. This cooperation may be used to exchange information about channel state information as well as the messages to be transmitted. The cooperation protocol used here generalizes Willems' conferencing. We show how this models base station cooperation in modern wireless cellular networks used for interference coordination and capacity enhancement. In particular, the coding theorem for the cooperative case shows how much cooperation is necessary in order to achieve maximal capacity in the network considered.
△ Less
Submitted 1 February, 2011; v1 submitted 3 May, 2010;
originally announced May 2010.
-
Entanglement Transmission over Arbitrarily Varying Quantum Channels
Authors:
R. Ahlswede,
I. Bjelakovic,
H. Boche,
J. Noetzel
Abstract:
We derive a regularized formula for the common randomness assisted entanglement transmission capacity of finite arbitrarily varying quantum channels (AVQC's). For finite AVQC's with positive capacity for classical message transmission we show, by derandomization through classical forward communication, that the random capacity for entanglement transmission equals the deterministic capacity for ent…
▽ More
We derive a regularized formula for the common randomness assisted entanglement transmission capacity of finite arbitrarily varying quantum channels (AVQC's). For finite AVQC's with positive capacity for classical message transmission we show, by derandomization through classical forward communication, that the random capacity for entanglement transmission equals the deterministic capacity for entanglement transmission. This is a quantum version of the famous Ahlswede dichotomy. In the infinite case, we derive a similar result for certain classes of AVQC's. At last, we give two possible definitions of symmetrizability of an AVQC.
△ Less
Submitted 30 April, 2010;
originally announced April 2010.
-
On Quantum Capacity of Compound Channels
Authors:
I. Bjelakovic,
H. Boche,
J. Noetzel
Abstract:
In this paper we address the issue of universal or robust communication over quantum channels. Specifically, we consider memoryless communication scenario with channel uncertainty which is an analog of compound channel in classical information theory. We determine the quantum capacity of finite compound channels and arbitrary compound channels with informed decoder. Our approach in the finite ca…
▽ More
In this paper we address the issue of universal or robust communication over quantum channels. Specifically, we consider memoryless communication scenario with channel uncertainty which is an analog of compound channel in classical information theory. We determine the quantum capacity of finite compound channels and arbitrary compound channels with informed decoder. Our approach in the finite case is based on the observation that perfect channel knowledge at the decoder does not increase the capacity of finite quantum compound channels. As a consequence we obtain coding theorem for finite quantum averaged channels, the simplest class of channels with long-term memory. The extension of these results to quantum compound channels with uninformed encoder and decoder, and infinitely many constituents remains an open problem.
△ Less
Submitted 7 August, 2008;
originally announced August 2008.
-
Capacity of Gaussian MIMO Bidirectional Broadcast Channels
Authors:
Rafael F. Wyrembelski,
Tobias J. Oechtering,
Igor Bjelakovic,
Clemens Schnurr,
Holger Boche
Abstract:
We consider the broadcast phase of a three-node network, where a relay node establishes a bidirectional communication between two nodes using a spectrally efficient two-phase decode-and-forward protocol. In the first phase the two nodes transmit their messages to the relay node. Then the relay node decodes the messages and broadcasts a re-encoded composition of them in the second phase. We consi…
▽ More
We consider the broadcast phase of a three-node network, where a relay node establishes a bidirectional communication between two nodes using a spectrally efficient two-phase decode-and-forward protocol. In the first phase the two nodes transmit their messages to the relay node. Then the relay node decodes the messages and broadcasts a re-encoded composition of them in the second phase. We consider Gaussian MIMO channels and determine the capacity region for the second phase which we call the Gaussian MIMO bidirectional broadcast channel.
△ Less
Submitted 30 April, 2008; v1 submitted 26 March, 2008;
originally announced March 2008.
-
On the Boundedness of the Support of Optimal Input Measures for Rayleigh Fading Channels
Authors:
Jochen Sommerfeld,
Igor Bjelakovic,
Holger Boche
Abstract:
We consider transmission over a wireless multiple antenna communication system operating in a Rayleigh flat fading environment with no channel state information at the receiver and the transmitter with coherence time T=1. We show that, subject to the average power constraint, the support of the capacity achieving input distribution is bounded. Moreover, we show by a simple example concerning the…
▽ More
We consider transmission over a wireless multiple antenna communication system operating in a Rayleigh flat fading environment with no channel state information at the receiver and the transmitter with coherence time T=1. We show that, subject to the average power constraint, the support of the capacity achieving input distribution is bounded. Moreover, we show by a simple example concerning the identity theorem (or uniqueness theorem) from the complex analysis in several variables that some of the existing results in the field are not rigorous.
△ Less
Submitted 14 January, 2008;
originally announced January 2008.
-
Classical Capacities of Averaged and Compound Quantum Channels
Authors:
Igor Bjelakovic,
Holger Boche
Abstract:
We determine the capacity of compound classical-quantum channels. As a consequence we obtain the capacity formula for the averaged classical-quantum channels. The capacity result for compound channels demonstrates, as in the classical setting, the existence of reliable universal classical-quantum codes in scenarios where the only a priori information about the channel used for the transmission o…
▽ More
We determine the capacity of compound classical-quantum channels. As a consequence we obtain the capacity formula for the averaged classical-quantum channels. The capacity result for compound channels demonstrates, as in the classical setting, the existence of reliable universal classical-quantum codes in scenarios where the only a priori information about the channel used for the transmission of information is that it belongs to a given set of memoryless classical-quantum channels. Our approach is based on the universal classical approximation of the quantum relative entropy which in turn relies on the universal hypothesis testing results.
△ Less
Submitted 16 February, 2009; v1 submitted 16 October, 2007;
originally announced October 2007.
-
Broadcast Capacity Region of Two-Phase Bidirectional Relaying
Authors:
Tobias J. Oechtering,
Igor Bjelakovic,
Clemens Schnurr,
Holger Boche
Abstract:
In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario eac…
▽ More
In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario each receiving node has perfect information about the message that is intended for the other node. The resulting set of achievable rates of the two-phase bidirectional relaying includes the region which can be achieved by applying XOR on the decoded messages at the relay node. We also prove the strong converse for the maximum error probability and show that this implies that the $[\eps_1,\eps_2]$-capacity region defined with respect to the average error probability is constant for small values of error parameters $\eps_1$, $\eps_2$.
△ Less
Submitted 15 March, 2007;
originally announced March 2007.
-
Ergodic Classical-Quantum Channels: Structure and Coding Theorems
Authors:
Igor Bjelakovic,
Holger Boche
Abstract:
We consider ergodic causal classical-quantum channels (cq-channels) which additionally have a decaying input memory. In the first part we develop some structural properties of ergodic cq-channels and provide equivalent conditions for ergodicity. In the second part we prove the coding theorem with weak converse for causal ergodic cq-channels with decaying input memory. Our proof is based on the p…
▽ More
We consider ergodic causal classical-quantum channels (cq-channels) which additionally have a decaying input memory. In the first part we develop some structural properties of ergodic cq-channels and provide equivalent conditions for ergodicity. In the second part we prove the coding theorem with weak converse for causal ergodic cq-channels with decaying input memory. Our proof is based on the possibility to introduce joint input-output state for the cq-channels and an application of the Shannon-McMillan theorem for ergodic quantum states. In the last part of the paper it is shown how this result implies coding theorem for the classical capacity of a class of causal ergodic quantum channels.
△ Less
Submitted 16 February, 2009; v1 submitted 29 September, 2006;
originally announced September 2006.
-
Structure of Optimal Input Covariance Matrices for MIMO Systems with Covariance Feedback under General Correlated Fading
Authors:
Igor Bjelakovic,
Holger Boche
Abstract:
We describe the structure of optimal Input covariance matrices for single user multiple-input/multiple-output (MIMO) communication system with covariance feedback and for general correlated fading. Our approach is based on the novel concept of right commutant and recovers previously derived results for the Kronecker product models. Conditions are derived which allow a significant simplification…
▽ More
We describe the structure of optimal Input covariance matrices for single user multiple-input/multiple-output (MIMO) communication system with covariance feedback and for general correlated fading. Our approach is based on the novel concept of right commutant and recovers previously derived results for the Kronecker product models. Conditions are derived which allow a significant simplification of the optimization problem.
△ Less
Submitted 29 September, 2006; v1 submitted 25 January, 2006;
originally announced January 2006.
-
Quantum Stein's lemma revisited, inequalities for quantum entropies, and a concavity theorem of Lieb
Authors:
Igor Bjelakovic,
Rainer Siegmund-Schultze
Abstract:
We derive the monotonicity of the quantum relative entropy by an elementary operational argument based on Stein's lemma in quantum hypothesis testing. For the latter we present an elementary and short proof that requires the law of large numbers only. Joint convexity of the quantum relative entropy is proven too, resulting in a self-contained elementary version of Tropp's approach to Lieb's concav…
▽ More
We derive the monotonicity of the quantum relative entropy by an elementary operational argument based on Stein's lemma in quantum hypothesis testing. For the latter we present an elementary and short proof that requires the law of large numbers only. Joint convexity of the quantum relative entropy is proven too, resulting in a self-contained elementary version of Tropp's approach to Lieb's concavity theorem, according to which the map tr(exp(h+log a)) is concave in a on positive operators for self-adjoint h.
△ Less
Submitted 21 March, 2012; v1 submitted 24 July, 2003;
originally announced July 2003.
-
The Shannon-McMillan Theorem for Ergodic Quantum Lattice Systems
Authors:
Igor Bjelakovic,
Tyll Krueger,
Rainer Siegmund-Schultze,
Arleta Szkola
Abstract:
We formulate and prove a quantum Shannon-McMillan theorem. The theorem demonstrates the significance of the von Neumann entropy for translation invariant ergodic quantum spin systems on n-dimensional lattices: the entropy gives the logarithm of the essential number of eigenvectors of the system on large boxes. The one-dimensional case covers quantum information sources and is basic for coding th…
▽ More
We formulate and prove a quantum Shannon-McMillan theorem. The theorem demonstrates the significance of the von Neumann entropy for translation invariant ergodic quantum spin systems on n-dimensional lattices: the entropy gives the logarithm of the essential number of eigenvectors of the system on large boxes. The one-dimensional case covers quantum information sources and is basic for coding theorems.
△ Less
Submitted 20 November, 2002; v1 submitted 15 July, 2002;
originally announced July 2002.