Skip to main content

Showing 1–50 of 117 results for author: Jafar, S A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01498  [pdf, ps, other

    cs.IT

    The Inverted 3-Sum Box: General Formulation and Quantum Information Theoretic Optimality

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $N$-sum box protocol specifies a class of $\mathbb{F}_d$ linear functions $f(W_1,\cdots,W_K)=V_1W_1+V_2W_2+\cdots+V_KW_K\in\mathbb{F}_d^{m\times 1}$ that can be computed at information theoretically optimal communication cost (minimum number of qudits $Δ_1,\cdots,Δ_K$ sent by the transmitters Alice$_1$, Alice$_2$,$\cdots$, Alice$_K$, respectively, to the receiver, Bob, per computation instance… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2404.09141  [pdf, ps, other

    cs.IT

    Blind Interference Alignment for MapReduce: Exploiting Side-information with Reconfigurable Antennas

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: In order to explore how blind interference alignment (BIA) schemes may take advantage of side-information in computation tasks, we study the degrees of freedom (DoF) of a $K$ user wireless network setting that arises in full-duplex wireless MapReduce applications. In this setting the receivers are assumed to have reconfigurable antennas and channel knowledge, while the transmitters have neither, i… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  3. arXiv:2311.08386  [pdf, ps, other

    cs.IT

    Capacity of Summation over a Symmetric Quantum Erasure MAC with Partially Replicated Inputs

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are distributed across $S$ servers, who also share quantum entanglement in advance. Each server $s\in[S]$ manipulates its quantum subsystem $\mathcal{Q}_s$ according to its own available… ▽ More

    Submitted 15 May, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  4. arXiv:2311.07829  [pdf, ps, other

    cs.IT

    A Coding Scheme for Unresponsive and Byzantine Server Resilient Quantum $X$-Secure $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: Building on recent constructions of Quantum Cross Subspace Alignment (QCSA) codes, this work develops a coding scheme for QEBXSTPIR, i.e., classical private information retrieval with $X$-secure storage and $T$-private queries, over a quantum multiple access channel, that is resilient to any set of up to $E$ erased servers (equivalently known as unresponsive servers, or stragglers) together with a… ▽ More

    Submitted 25 February, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  5. arXiv:2305.20073  [pdf, ps, other

    cs.IT

    On the Capacity of Secure $K$-user Product Computation over a Quantum MAC

    Authors: Yuxiang Lu, Yuhang Yao, Syed A. Jafar

    Abstract: Inspired by recent work by Christensen and Popovski on secure $2$-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to $K$ users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo-$d$ ($d\geq 2$) secure $K$-sum computatio… ▽ More

    Submitted 28 August, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in IEEE Communications Letters

  6. arXiv:2305.03122  [pdf, ps, other

    cs.IT

    The Capacity of Classical Summation over a Quantum MAC with Arbitrarily Distributed Inputs and Entanglements

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $Σ$-QMAC problem is introduced, involving $S$ servers, $K$ classical ($\mathbb{F}_d$) data streams, and $T$ independent quantum systems. Data stream ${\sf W}_k, k\in[K]$ is replicated at a subset of servers $\mathcal{W}(k)\subset[S]$, and quantum system $\mathcal{Q}_t, t\in[T]$ is distributed among a subset of servers $\mathcal{E}(t)\subset[S]$ such that Server $s\in\mathcal{E}(t)$ receives su… ▽ More

    Submitted 5 May, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  7. arXiv:2304.14676  [pdf, ps, other

    cs.IT

    Quantum Cross Subspace Alignment Codes via the $N$-sum Box Abstraction

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Cross-subspace alignment (CSA) codes are used in various private information retrieval (PIR) schemes (e.g., with secure storage) and in secure distributed batch matrix multiplication (SDBMM). Using a recently developed $N$-sum box abstraction of a quantum multiple-access channel (QMAC), we translate CSA schemes over classical multiple-access channels into efficient quantum CSA schemes over a QMAC,… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2304.07561

  8. arXiv:2209.07602  [pdf, ps, other

    cs.IT

    On the Generic Capacity of $K$-User Symmetric Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: Linear computation broadcast (LCBC) refers to a setting with $d$ dimensional data stored at a central server, where $K$ users, each with some prior linear side-information, wish to retrieve various linear combinations of the data. The goal is to determine the minimum amount of information that must be broadcast to satisfy all the users. The reciprocal of the optimal broadcast cost is the capacity… ▽ More

    Submitted 14 December, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

  9. arXiv:2206.10049  [pdf, ps, other

    cs.IT

    The Capacity of 3 User Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $K$ User Linear Computation Broadcast (LCBC) problem is comprised of $d$ dimensional data (from $\mathbb{F}_q$), that is fully available to a central server, and $K$ users, who require various linear computations of the data, and have prior knowledge of various linear functions of the data as side-information. The optimal broadcast cost is the minimum number of $q$-ary symbols to be broadcast… ▽ More

    Submitted 5 May, 2024; v1 submitted 20 June, 2022; originally announced June 2022.

  10. arXiv:2205.02216  [pdf, other

    cs.IT

    The Extremal GDoF Gain of Optimal versus Binary Power Control in $K$ User Interference Networks Is $Θ(\sqrt{K})$

    Authors: Yao-Chia Chan, Pouya Pezeshkpour, Chunhua Geng, Syed A. Jafar

    Abstract: Using ideas from Generalized Degrees of Freedom (GDoF) analyses and extremal network theory, this work studies the extremal gain of optimal power control over binary (on/off) power control, especially in large interference networks, in search of new theoretical insights. Whereas numerical studies have already established that in most practical settings binary power control is close to optimal, the… ▽ More

    Submitted 5 May, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 18 pages, 5 figures; Typo corrections

  11. arXiv:2202.07693  [pdf, ps, other

    cs.IT

    On Single Server Private Information Retrieval with Private Coded Side Information

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Motivated by an open problem and a conjecture, this work studies the problem of single server private information retrieval with private coded side information (PIR-PCSI) that was recently introduced by Heidarzadeh et al. The goal of PIR-PCSI is to allow a user to efficiently retrieve a desired message $\bm{W}_{\bmθ}$, which is one of $K$ independent messages that are stored at a server, while uti… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  12. arXiv:2107.10448  [pdf, other

    cs.DC

    Flexible Distributed Matrix Multiplication

    Authors: Weiqi Li, Zhen Chen, Zhiying Wang, Syed A. Jafar, Hamid Jafarkhani

    Abstract: The distributed matrix multiplication problem with an unknown number of stragglers is considered, where the goal is to efficiently and flexibly obtain the product of two massive matrices by distributing the computation across N servers. There are up to N - R stragglers but the exact number is not known a priori. Motivated by reducing the computation load of each server, a flexible solution is prop… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

  13. arXiv:2105.07567  [pdf, ps, other

    cs.IT

    Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis

    Authors: Junge Wang, Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed matrix multiplication (CDMM) schemes, such as MatDot codes, seek efficient ways to distribute matrix multiplication task(s) to a set of $N$ distributed servers so that the answers returned from any $R$ servers are sufficient to recover the desired product(s). For example, to compute the product of matrices ${\bf U, V}$, MatDot codes partition each matrix into $p>1$ sub-matrices t… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: 7 pages, 4 figures, submitted to ITW2021

  14. arXiv:2103.07830  [pdf, other

    cs.IT

    Sum-GDoF of Symmetric Multi-hop Interference Channel under Finite Precision CSIT using Aligned-Images Sumset Inequalities

    Authors: Junge Wang, Syed Ali Jafar

    Abstract: Aligned-Images Sumset Inequalities are used in this work to study the Generalized Degrees of Freedom (GDoF) of the symmetric layered multi-hop interference channel under the robust assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. First, the sum-GDoF value is characterized for the $2\times 2\times 2$ setting that is comprised of $2$ sources,… ▽ More

    Submitted 13 March, 2021; originally announced March 2021.

    Comments: 35 pages, 11 figures

  15. arXiv:2102.04355  [pdf, other

    cs.IT

    Multilevel Topological Interference Management: A TIM-TIN Perspective

    Authors: Chunhua Geng, Hua Sun, Syed A. Jafar

    Abstract: The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowle… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: This work will be submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  16. arXiv:2011.12947  [pdf, ps, other

    cs.IT

    Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes?

    Authors: Yao-Chia Chan, Syed A. Jafar

    Abstract: Under the assumption of perfect channel state information at the transmitters (CSIT), it is known that structured codes offer significant advantages for secure communication in an interference network, e.g., structured jamming signals based on lattice codes may allow a receiver to decode the sum of the jamming signal and the signal being jammed, even though they cannot be separately resolved due t… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: 34 pages, 10 figures

  17. arXiv:2010.01059  [pdf, ps, other

    cs.IT

    $X$-Secure $T$-Private Federated Submodel Learning with Elastic Dropout Resilience

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Motivated by recent interest in federated submodel learning, this work explores the fundamental problem of privately reading from and writing to a database comprised of $K$ files (submodels) that are stored across $N$ distributed servers according to an $X$-secure threshold secret sharing scheme. One after another, various users wish to retrieve their desired file, locally process the information… ▽ More

    Submitted 22 March, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

  18. Double Blind $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Zhuqing Jia, Syed A. Jafar

    Abstract: Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($θ_1, θ_2$, resp.), to efficiently retrieve a message $W(θ_1,θ_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to… ▽ More

    Submitted 8 March, 2021; v1 submitted 9 August, 2020; originally announced August 2020.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Information Theory (JSAIT)

  19. arXiv:2006.02310  [pdf, ps, other

    cs.IT

    Canonical Conditions for K/2 Degrees of Freedom

    Authors: Recep Gül, David Stotz, Syed Ali Jafar, Helmut Bölcskei, Shlomo Shamai

    Abstract: We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignm… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

  20. arXiv:2002.07750  [pdf, other

    cs.IT cs.CR cs.DC

    GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication

    Authors: Zhen Chen, Zhuqing Jia, Zhiying Wang, Syed A. Jafar

    Abstract: A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the goal is to allow a master to efficiently compute the pairwise products of two batches of massive matrices, by distributing the computation across S servers. Any X colluding servers gain no information about the input, and the master gains no additional information about the input beyond the product. A solutio… ▽ More

    Submitted 6 September, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

  21. arXiv:1909.13873  [pdf, other

    cs.IT

    Cross Subspace Alignment Codes for Coded Distributed Batch Computation

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed batch computation distributes a computation task, such as matrix multiplication, $N$-linear computation, or multivariate polynomial evaluation, across $S$ servers through a coding scheme, such that the response from any $R$ servers ($R$ is called the recovery threshold) is sufficient for the user to recover the desired computed value. Current approaches are based on either exclus… ▽ More

    Submitted 14 November, 2019; v1 submitted 30 September, 2019; originally announced September 2019.

    Comments: Improved recovery threshold for GCSA codes and added discussion of server latency constraints

  22. arXiv:1908.10854  [pdf, other

    cs.IT

    $X$-secure $T$-private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in this paper, where the user wishes to privately retrieve one out of $K$ independent messages that are distributed over $N$ servers according to an MDS code. It is guaranteed that any group of up to $X$ colluding servers learn nothing about the messages and that any group of up to $T$ colluding servers l… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

  23. arXiv:1908.06957  [pdf, ps, other

    cs.IT

    On the Capacity of Secure Distributed Batch Matrix Multiplication

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of secure distributed batch matrix multiplication (SDBMM) studies the communication efficiency of retrieving a sequence of desired matrix products ${\bf AB}$ $=$ $({\bf A}_1{\bf B}_1,$ ${\bf A}_2{\bf B}_2,$ $\cdots,$ ${\bf A}_S{\bf B}_S)$ from $N$ distributed servers where the constituent matrices ${\bf A}=({\bf A}_1, {\bf A}_2, \cdots, {\bf A}_S)$ and… ▽ More

    Submitted 22 June, 2021; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: The updated version is the revision for IEEE IT Transactions

  24. arXiv:1908.00703  [pdf, other

    cs.IT

    GDoF of Interference Channel with Limited Cooperation under Finite Precision CSIT

    Authors: Junge Wang, Bofeng Yuan, Lexiang Huang, Syed A. Jafar

    Abstract: The Generalized Degrees of Freedom (GDoF) of the two user interference channel are characterized for all parameter regimes under the assumption of finite precision channel state information at the transmitters (CSIT), when a limited amount of (half-duplex or full-duplex) cooperation is allowed between the transmitters in the form of $π$ DoF of shared messages. In all cases, the number of over-the-… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 39 pages,10 figures,

  25. arXiv:1904.05906  [pdf, ps, other

    cs.IT

    On the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval with Graph Based Replicated Storage

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary $T$-privacy and $X$-security constraints, where the privacy of the user must… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  26. arXiv:1903.07597  [pdf, ps, other

    cs.IT

    On the Capacity of Computation Broadcast

    Authors: Hua Sun, Syed A. Jafar

    Abstract: The two-user computation broadcast problem is introduced as the setting where User $1$ wants message $W_1$ and has side-information $W_1'$, User $2$ wants message $W_2$ and has side-information $W_2'$, and $(W_1, W_1', W_2, W_2')$ may have arbitrary dependencies. The rate of a computation broadcast scheme is defined as the ratio $H(W_1,W_2)/H(S)$, where $S$ is the information broadcast to both use… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  27. arXiv:1901.09885  [pdf, other

    cs.IT

    Towards an Extremal Network Theory -- Robust GDoF Gain of Transmitter Cooperation over TIN

    Authors: Yao-Chia Chan, Junge Wang, Syed A. Jafar

    Abstract: Significant progress has been made recently in Generalized Degrees of Freedom (GDoF) characterizations of wireless interference channels (IC) and broadcast channels (BC) under the assumption of finite precision channel state information at the transmitters (CSIT), especially for smaller or highly symmetric network settings. A critical barrier in extending these results to larger and asymmetric net… ▽ More

    Submitted 24 October, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: 35 pages, 7 figures. Submitted to IEEE Transactions on Information Theory

  28. arXiv:1901.06010  [pdf, other

    cs.IT

    Degrees of Freedom Region of the $(M,N_1,N_2)$ MIMO Broadcast Channel with Partial CSIT: An Application of Sum-set Inequalities Based on Aligned Image Sets

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: The degrees of freedom (DoF) region is characterized for the $2$-user multiple input multiple output (MIMO) broadcast channel (BC), where the transmitter is equipped with $M$ antennas, the two receivers are equipped with $N_1$ and $N_2$ antennas, and the levels of channel state information at the transmitter (CSIT) for the two users are parameterized by $β_1, β_2$, respectively. The achievability… ▽ More

    Submitted 17 January, 2019; originally announced January 2019.

    Comments: 43 pages,11 figures

  29. arXiv:1812.05566  [pdf, other

    cs.IT

    On the Capacity of Locally Decodable Codes

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A locally decodable code (LDC) maps $K$ source symbols, each of size $L_w$ bits, to $M$ coded symbols, each of size $L_x$ bits, such that each source symbol can be decoded from $N \leq M$ coded symbols. A perfectly smooth LDC further requires that each coded symbol is uniformly accessed when we decode any one of the messages. The ratio $L_w/L_x$ is called the symbol rate of an LDC. The highest pos… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  30. arXiv:1808.07457  [pdf, other

    cs.IT

    Cross Subspace Alignment and the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval

    Authors: Zhuqing Jia, Hua Sun, Syed A. Jafar

    Abstract: $X$-secure and $T$-private information retrieval (XSTPIR) is a form of private information retrieval where data security is guaranteed against collusion among up to $X$ servers and the user's privacy is guaranteed against collusion among up to $T$ servers. The capacity of XSTPIR is characterized for arbitrary number of servers $N$, and arbitrary security and privacy thresholds $X$ and $T… ▽ More

    Submitted 3 March, 2019; v1 submitted 22 August, 2018; originally announced August 2018.

  31. arXiv:1801.07419  [pdf, other

    cs.IT

    Optimality of Simple Layered Superposition Coding in the 3 User MISO BC with Finite Precision CSIT

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: We study the $K=3$ user multiple input single output (MISO) broadcast channel (BC) with $M=3$ antennas at the transmitter and $1$ antenna at each receiver, from the generalized degrees of freedom (GDoF) perspective, under the assumption that the channel state information at the transmitter (CSIT) is limited to finite precision. In particular, our goal is to identify a parameter regime where a simp… ▽ More

    Submitted 14 May, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

    Comments: 51 pages, 6 figures, generalizations to K users have been added, submitted to the IT Transactions

  32. arXiv:1711.00044  [pdf, other

    cs.IT

    $K$-User Symmetric M$\times$N MIMO Interference Channel under Finite Precision CSIT: A GDoF perspective

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: Generalized Degrees of Freedom (GDoF) are characterized for the symmetric $K$-user Multiple Input Multiple Output (MIMO) Interference Channel (IC) under the assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. In this symmetric setting, each transmitter is equipped with $M$ antennas, each receiver is equipped with $N$ antennas, each desired chann… ▽ More

    Submitted 31 October, 2017; originally announced November 2017.

    Comments: 22 pages, 4 figures

  33. arXiv:1710.11098  [pdf, ps, other

    cs.IT

    The Capacity of Private Computation

    Authors: Hua Sun, Syed A. Jafar

    Abstract: We introduce the problem of private computation, comprised of $N$ distributed and non-colluding servers, $K$ independent datasets, and a user who wants to compute a function of the datasets privately, i.e., without revealing which function he wants to compute, to any individual server. This private computation problem is a strict generalization of the private information retrieval (PIR) problem, o… ▽ More

    Submitted 25 November, 2017; v1 submitted 30 October, 2017; originally announced October 2017.

  34. arXiv:1705.02775  [pdf, other

    cs.IT

    Network Coherence Time Matters - Aligned Image Sets and the Degrees of Freedom of Interference Networks with Finite Precision CSIT and Perfect CSIR

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: This work obtains the first bound that is provably sensitive to network coherence time, i.e., coherence time in an interference network where all channels experience the same coherence patterns. This is accomplished by a novel adaptation of the aligned image sets bound, and settles various open problems noted previously by Naderi and Avestimehr and by Gou et al. For example, a necessary and suffic… ▽ More

    Submitted 8 May, 2017; originally announced May 2017.

    Comments: 19 pages, 4 figures

  35. arXiv:1705.00769  [pdf, other

    cs.IT

    Aligned Image Sets and the Generalized Degrees of Freedom of Symmetric MIMO Interference Channel with Partial CSIT

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: The generalized degrees of freedom (GDoF) of the two user symmetric multiple input multiple output (MIMO) interference channel (IC) are characterized as a function of the channel strength levels and the level of channel state information at the transmitters (CSIT). In this symmetric setting, each transmitter is equipped with M antennas, each receiver is equipped with N antennas, and both cross lin… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 21 pages, 3 figures

  36. arXiv:1703.01168  [pdf, other

    cs.IT

    Sum-set Inequalities from Aligned Image Sets: Instruments for Robust GDoF Bounds

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: We present sum-set inequalities specialized to the generalized degrees of freedom (GDoF) framework. These are information theoretic lower bounds on the entropy of bounded density linear combinations of discrete, power-limited dependent random variables in terms of the joint entropies of arbitrary linear combinations of new random variables that are obtained by power level partitioning of the origi… ▽ More

    Submitted 24 August, 2017; v1 submitted 3 March, 2017; originally announced March 2017.

    Comments: 35 pages, 7 figures

  37. arXiv:1701.07807  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Private Information Retrieval from MDS Coded Data with Colluding Servers: Settling a Conjecture by Freij-Hollanti et al.

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A $(K, N, T, K_c)$ instance of the MDS-TPIR problem is comprised of $K$ messages and $N$ distributed servers. Each message is separately encoded through a $(K_c, N)$ MDS storage code. A user wishes to retrieve one message, as efficiently as possible, while revealing no information about the desired message index to any colluding set of up to $T$ servers. The fundamental limit on the efficiency of… ▽ More

    Submitted 30 January, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

  38. arXiv:1611.02257  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Multiround Private Information Retrieval: Capacity and Storage Overhead

    Authors: Hua Sun, Syed A. Jafar

    Abstract: The capacity has recently been characterized for the private information retrieval (PIR) problem as well as several of its variants. In every case it is assumed that all the queries are generated by the user simultaneously. Here we consider multiround PIR, where the queries in each round are allowed to depend on the answers received in previous rounds. We show that the capacity of multiround PIR i… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

  39. arXiv:1610.03048  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A private information retrieval scheme is a mechanism that allows a user to retrieve any one out of $K$ messages from $N$ non-communicating replicated databases, each of which stores all $K$ messages, without revealing anything about the identity of the desired message index to any individual database. If the size of each message is $L$ bits and the total download required by a PIR scheme from all… ▽ More

    Submitted 10 October, 2016; originally announced October 2016.

  40. arXiv:1606.08828  [pdf, other

    cs.IT cs.CR cs.IR

    The Capacity of Symmetric Private Information Retrieval

    Authors: Hua Sun, Syed A. Jafar

    Abstract: Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out of $K$ messages from $N$ non-communicating replicated databases (each holds all $K$ messages) while kee** the identity of the desired message index a secret from each individual database. Symmetric PIR (SPIR) is a generalization of PIR to include the requirement that beyond the desired message, t… ▽ More

    Submitted 15 July, 2017; v1 submitted 28 June, 2016; originally announced June 2016.

  41. arXiv:1605.00635  [pdf, ps, other

    cs.IT cs.CR cs.IR

    The Capacity of Robust Private Information Retrieval with Colluding Databases

    Authors: Hua Sun, Syed A. Jafar

    Abstract: Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out of $K$ messages from $N$ non-communicating replicated databases (each holds all $K$ messages) while kee** the identity of the desired message index a secret from each individual database. The information theoretic capacity of PIR (equivalently, the reciprocal of minimum download cost) is the maxi… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

  42. arXiv:1604.00582  [pdf, other

    cs.IT

    Elevated Multiplexing and Signal Space Partitioning in the 2 User MIMO IC with Partial CSIT

    Authors: Bofeng Yuan, Syed A. Jafar

    Abstract: The $2$ user MIMO interference channel with arbitrary antenna configurations is studied under arbitrary levels of partial CSIT for each of the channels, to find the degrees of freedom (DoF) achievable by either user while the other user achieves his full interference-free DoF. The goal is to gain new insights due to the inclusion of MIMO (multiple antennas at both transmitters and receivers) into… ▽ More

    Submitted 2 April, 2016; originally announced April 2016.

    Comments: Submitted as an invited paper to IEEE SPAWC

  43. arXiv:1602.09134  [pdf, ps, other

    cs.IT cs.CR cs.IR

    The Capacity of Private Information Retrieval

    Authors: Hua Sun, Syed A. Jafar

    Abstract: In the private information retrieval (PIR) problem a user wishes to retrieve, as efficiently as possible, one out of $K$ messages from $N$ non-communicating databases (each holds all $K$ messages) while revealing nothing about the identity of the desired message index to any individual database. The information theoretic capacity of PIR is the maximum number of bits of desired information that can… ▽ More

    Submitted 26 February, 2017; v1 submitted 29 February, 2016; originally announced February 2016.

  44. arXiv:1602.02203  [pdf, other

    cs.IT

    GDoF of the MISO BC: Bridging the Gap between Finite Precision and Perfect CSIT

    Authors: Arash Gholami Davoodi, Bofeng Yuan, Syed A. Jafar

    Abstract: For the $K=2$ user MISO BC, i.e., the wireless broadcast channel where a transmitter equipped with $K=2$ antennas sends independent messages to $K=2$ receivers each of which is equipped with a single antenna, the sum generalized degrees of freedom (GDoF) are characterized for arbitrary channel strength and channel uncertainty levels for each of the channel coefficients. The result is extended to… ▽ More

    Submitted 26 August, 2016; v1 submitted 5 February, 2016; originally announced February 2016.

    Comments: 19 pages, 2 figures

  45. arXiv:1601.07885  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Blind Interference Alignment for Private Information Retrieval

    Authors: Hua Sun, Syed A. Jafar

    Abstract: Blind interference alignment (BIA) refers to interference alignment schemes that are designed only based on channel coherence pattern knowledge at the transmitters (the "blind" transmitters do not know the exact channel values). Private information retrieval (PIR) refers to the problem where a user retrieves one out of K messages from N non-communicating databases (each holds all K messages) witho… ▽ More

    Submitted 28 January, 2016; originally announced January 2016.

  46. arXiv:1601.06463  [pdf, other

    cs.IT

    Generalized Degrees of Freedom of the Symmetric K-User Interference Channel under Finite Precision CSIT

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: The generalized degrees of freedom (GDoF) characterization of the symmetric K-user interference channel is obtained under finite precision channel state information at the transmitters (CSIT). The symmetric setting is where each cross channel is capable of carrying degrees of freedom (DoF) while each direct channel is capable of carrying 1 DoF. Remarkably, under finite precision CSIT the symmetric… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

    Comments: 19 pages, 2 figures

  47. arXiv:1510.05725  [pdf, other

    cs.IT

    Replication-based Outer bounds and the Optimality of "Half the Cake" for Rank-Deficient MIMO Interference Networks

    Authors: Bofeng Yuan, Hua Sun, Syed A. Jafar

    Abstract: In order to gain new insights into MIMO interference networks, the optimality of $\sum_{k=1}^K M_k/2$ (half the cake per user) degrees of freedom is explored for a $K$-user multiple-input-multiple-output (MIMO) interference channel where the cross-channels have arbitrary rank constraints, and the $k^{th}$ transmitter and receiver are equipped with $M_k$ antennas each. The result consolidates and s… ▽ More

    Submitted 19 October, 2015; originally announced October 2015.

    Comments: Presented in part at IEEE GLOBECOM 2015

  48. arXiv:1501.07870  [pdf, other

    cs.IT

    TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite

    Authors: ** Yi, Hua Sun, Syed A. Jafar, David Gesbert

    Abstract: The main result of this work is that an orthogonal access scheme such as TDMA achieves the all-unicast degrees of freedom (DoF) region of the topological interference management (TIM) problem if and only if the network topology graph is chordal bipartite, i.e., every cycle that can contain a chord, does contain a chord. The all-unicast DoF region includes the DoF region for any arbitrary choice of… ▽ More

    Submitted 5 February, 2017; v1 submitted 30 January, 2015; originally announced January 2015.

  49. arXiv:1412.2711  [pdf, other

    cs.IT

    On the Optimality of Treating Interference as Noise: Compound Interference Networks

    Authors: Chunhua Geng, Syed A. Jafar

    Abstract: In a K-user Gaussian interference channel, it has been shown by Geng et al. that if for each user the desired signal strength is no less than the sum of the strengths of the strongest interference from this user and the strongest interference to this user (all values in dB scale), then power control and treating interference as noise (TIN) is optimal from the perspective of generalized degrees of… ▽ More

    Submitted 8 December, 2014; originally announced December 2014.

  50. arXiv:1410.5107  [pdf, ps, other

    cs.IT

    The DoF of the Asymmetric MIMO Interference Channel with Square Direct Link Channel Matrices

    Authors: Tang Liu, Daniela Tuninetti, Syed A. Jafar

    Abstract: This paper studies the sum Degrees of Freedom (DoF) of $K$-user {\em asymmetric} MIMO Interference Channel (IC) with square direct link channel matrices, that is, the $u$-th transmitter and its intended receiver have $M_u\in\mathbb{N}$ antennas each, where $M_u$ need not be the same for all $u\in[1:K]$. Starting from a $3$-user example, it is shown that existing cooperation-based outer bounds ar… ▽ More

    Submitted 19 October, 2014; originally announced October 2014.

    Comments: Presented at 52nd Allerton Conference, 2014