-
MARPF: Multi-Agent and Multi-Rack Path Finding
Abstract: In environments where many automated guided vehicles (AGVs) operate, planning efficient, collision-free paths is essential. Related research has mainly focused on environments with static passages, resulting in space inefficiency. We define multi-agent and multi-rack path finding (MARPF) as the problem of planning paths for AGVs to convey target racks to their designated locations in environments… ▽ More
Submitted 18 March, 2024; originally announced March 2024.
Comments: 6 pages, 10 figures, submitted to IROS 2024
-
arXiv:2302.01314 [pdf, ps, other]
Universal Coding for Shannon Ciphers under Side-Channel Attacks
Abstract: We study the universal coding under side-channel attacks posed and investigated by Oohama and Santoso (2022). They proposed a theoretical security model for Shannon cipher system under side-channel attacks, where the adversary is not only allowed to collect ciphertexts by eavesdrop** the public communication channel, but is also allowed to collect the physical information leaked by the devices w… ▽ More
Submitted 12 May, 2024; v1 submitted 2 February, 2023; originally announced February 2023.
Comments: 6 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1801.02563, arXiv:2201.11670, arXiv:1901.05940
-
Algorithm Families for Computing Information-Theoretic Forms of Strong Converse Exponents in Channel Coding and Lossy Source Coding
Abstract: The error exponent of a discrete memoryless channel is expressed in two forms. One is Gallager's expression with a positive slope parameter and the other is Csiszar and Korner's information-theoretic representation expressed using the mutual information and the relative entropy. They differ in appearance, and existing methods to prove their agreement are not elementary, as they require an evaluati… ▽ More
Submitted 4 November, 2022; v1 submitted 12 May, 2022; originally announced May 2022.
Comments: 77 pages, 9 figures
-
Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources
Abstract: We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there i… ▽ More
Submitted 28 June, 2022; v1 submitted 21 February, 2022; originally announced February 2022.
Comments: This work is presented at ISIT 2022
-
arXiv:2201.11670 [pdf, ps, other]
Strong Converse Theorem for Source Encryption under Side-Channel Attacks
Abstract: We are interested in investigating the security of source encryption with a symmetric key under side-channel attacks. In this paper, we propose a general framework of source encryption with a symmetric key under the side-channel attacks, which applies to \emph{any} source encryption with a symmetric key and \emph{any} kind of side-channel attacks targeting the secret key. We also propose a new sec… ▽ More
Submitted 7 February, 2022; v1 submitted 27 January, 2022; originally announced January 2022.
Comments: 9 pages, 6 figures. The short version of this paper was submitted to ISIT2022, arXiv admin note: text overlap with arXiv:1801.02563, arXiv:2102.06363
-
arXiv:2102.06363 [pdf, ps, other]
New Distributed Source Encryption Framework
Abstract: We pose and investigate the distributed secure source coding based on the common key cryptosystem. This cryptosystem includes the secrecy amplification problem for distributed encrypted sources with correlated keys using post-encryption-compression, which was posed investigated by Santoso and Oohama. In this paper we propose another new security criterion which is generally more strict compared to… ▽ More
Submitted 30 August, 2022; v1 submitted 12 February, 2021; originally announced February 2021.
Comments: 9 pages, 3 figure. The short version was submitted to ISITA 2022. We have several typos in the short version. In this arXiv version we have fixed all those typos
-
Biometric Identification Systems With Noisy Enrollment for Gaussian Source
Abstract: In the present paper, we investigate the fundamental trade-off of identification, secrecy, storage, and privacy-leakage rates in biometric identification systems for hidden or remote Gaussian sources. We introduce a technique for deriving the capacity region of these rates by converting the system to one where the data flow is in one-way direction. Also, we provide numerical calculations of three… ▽ More
Submitted 21 October, 2020; originally announced October 2020.
-
arXiv:1904.04894 [pdf, ps, other]
New Converse Bounds for Discrete Memoryless Channels in the Finite Blocklength Regime
Abstract: We study the determination problem of the channel capacity for the discrete memoryless channels in the finite blocklength regime. We derive explicit lower and upper bounds of the capacity. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.
Submitted 9 April, 2019; originally announced April 2019.
Comments: 10 pages, no figures, the short version was submitted to ITW2019
-
The Conditional Information Leakage Given Eavesdropper's Received Signals in Wiretap Channels
Abstract: Information leakage in Wyner's wiretap channel model is usually defined as the mutual information between the secret message and the eavesdropper's received signal. We define a new quantity called "conditional information leakage given the eavesdropper's received signals," which expresses the amount of information that eavesdropper gains from his/her received signal. A benefit of introducing this… ▽ More
Submitted 24 January, 2019; v1 submitted 18 January, 2019; originally announced January 2019.
-
arXiv:1901.05940 [pdf, ps, other]
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks
Abstract: We consider the secure communication problem for broadcasting of two encrypted sources. The sender wishes to broadcast two secret messages via two common key cryptosystems. We assume that the adversary can use the side-channel, where the side information on common keys can be obtained via the rate constraint noiseless channel. To solve this problem we formulate the post encryption coding system. O… ▽ More
Submitted 1 March, 2019; v1 submitted 17 January, 2019; originally announced January 2019.
Comments: 13 pages, 4 figures. In the current version we we have corrected errors in Fig. 2 and Fig. 4. arXiv admin note: substantial text overlap with arXiv:1801.02563, arXiv:1801.04920
-
arXiv:1901.04968 [pdf, ps, other]
A New Inequality Related to Proofs of Strong Converse Theorems for Source or Channel Networks
Abstract: In this paper we provide a new inequality useful for the proofs of strong converse theorems in the multiterminal information theory. We apply this inequality to the recent work by Tyagi and Watanabe on the strong converse theorem for the Wyner-Ziv source coding problem to obtain a new strong converse outer bound. This outer bound deviates from the Wyner-Ziv rate distortion region with the order… ▽ More
Submitted 17 January, 2019; v1 submitted 15 January, 2019; originally announced January 2019.
Comments: 10 pages
-
Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders
Abstract: This paper proposed the application of post-encryption-compression (PEC) to strengthen the secrecy in the case of distributed encryption where the encryption keys are correlated to each other. We derive the universal code construction for the compression and the rate region where codes with achievability and secrecy are obtainable. Our main technique is to use affine encoders which are constructed… ▽ More
Submitted 13 January, 2018; originally announced January 2018.
Comments: An extended abstract is submitted to ISIT 2018. This is the full version. arXiv admin note: text overlap with arXiv:1801.02563
-
arXiv:1801.02563 [pdf, ps, other]
Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System
Abstract: We study side-channel attacks for the Shannon cipher system. To pose side channel-attacks to the Shannon cipher system, we regard them as a signal estimation via encoded data from two distributed sensors. This can be formulated as the one helper source coding problem posed and investigated by Ahlswede, Körner(1975), and Wyner(1975). We further investigate the posed problem to derive new secrecy bo… ▽ More
Submitted 18 January, 2019; v1 submitted 8 January, 2018; originally announced January 2018.
Comments: 12pages, 3 figures, the short version was presented at ISIT 2018
-
arXiv:1702.01285 [pdf, ps, other]
On a Relationship between the Correct Probability of Estimation from Correlated Data and Mutual Information
Abstract: Let $X$, $Y$ be two correlated discrete random variables. We consider an estimation of $X$ from encoded data $\varphi(Y)$ of $Y$ by some encoder function $\varphi(Y)$. We derive an inequality describing a relation of the correct probability of estimation and the mutual information between $X$ and $\varphi(Y)$. This inequality may be useful for the secure analysis of crypto system when we use the s… ▽ More
Submitted 4 February, 2017; originally announced February 2017.
-
arXiv:1701.06545 [pdf, ps, other]
Exponent Function for Stationary Memoryless Channels with Input Cost at Rates above the Capacity
Abstract: We consider the stationaly memoryless channels with input cost. We prove that for transmission rates above the capacity the correct probability of decoding tends to zero exponentially as the block length $n$ of codes tends to infinity. In the case where both of channel input and output sets are finite, we determine the optimal exponent function on the above exponential decay of the correct probabi… ▽ More
Submitted 4 February, 2017; v1 submitted 23 January, 2017; originally announced January 2017.
Comments: 15pages. arXiv admin note: text overlap with arXiv:1701.06357
-
arXiv:1701.06357 [pdf, ps, other]
The Reliability Function for the Additive White Gaussian Noise Channel at Rates above the Capacity
Abstract: We consider the additive white Gaussian noise channels. We prove that the error probability of decoding tends to one exponentially for rates above the capacity and derive the optimal exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.
Submitted 5 February, 2017; v1 submitted 23 January, 2017; originally announced January 2017.
Comments: 11pages
-
arXiv:1604.02901 [pdf, ps, other]
New Strong Converse for Asymmetric Broadcast Channels
Abstract: We consider the discrete memoryless asymmetric broadcast channels. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.
Submitted 9 August, 2020; v1 submitted 11 April, 2016; originally announced April 2016.
Comments: 20 pages, 1 figures, a short version of this paper is submitted to the International Symposium on Information Theory and Its Applications(ISITA),October 30-November 2, 2016, Monterey, California, USA. arXiv admin note: text overlap with arXiv:1603.06344, arXiv:1601.05650
-
arXiv:1603.06344 [pdf, ps, other]
Strong Converse Exponent for State Dependent Channels With Full State Information at the Sender
Abstract: We consider the state dependent channels with full state information with at the sender. For this state dependent channel, the channel capacity was determined by Gel'fand and Pinsker. In this paper, we study the correct probability of decoding at rates above the capacity. We prove that when the transmission rate is above the capacity this probability goes to zero exponentially and derive an explic… ▽ More
Submitted 10 August, 2020; v1 submitted 21 March, 2016; originally announced March 2016.
Comments: The present version has 14 pages and one figure. In the previous version we have a gap on the proof of the main result. In the current version we have fixed the gap for the special case that the state information is not available at the receiver
-
arXiv:1601.06094 [pdf, ps, other]
An Iterative Algorithm for Computing the Optimal Exponent of Correct Decoding Probability for Rates below the Rate Distortion Function
Abstract: The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Kö… ▽ More
Submitted 27 May, 2016; v1 submitted 22 January, 2016; originally announced January 2016.
Comments: 9 pages, 1 figure
-
arXiv:1601.05650 [pdf, ps, other]
Exponent Function for Source Coding with Side Information at the Decoder at Rates below the Rate Distortion Function
Abstract: We consider the rate distortion problem with side information at the decoder posed and investigated by Wyner and Ziv. The rate distortion function indicating the trade-off between the rate on the data compression and the quality of data obtained at the decoder was determined by Wyner and Ziv. In this paper, we study the error probability of decoding at rates below the rate distortion function. We… ▽ More
Submitted 26 April, 2016; v1 submitted 21 January, 2016; originally announced January 2016.
Comments: 17 pages, 1 figures, extended version of ISITA 2016 submission. arXiv admin note: text overlap with arXiv:1504.05891
-
arXiv:1504.05948 [pdf, ps, other]
Strong Converse Theorems for Degraded Broadcast Channels with Feedback
Abstract: We consider the discrete memoryless degraded broadcast channels with feedback. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.
Submitted 22 April, 2015; originally announced April 2015.
Comments: Short version of this paper is accepted for presentation at ISIT 2015. arXiv admin note: substantial text overlap with arXiv:1504.05941
-
arXiv:1504.05941 [pdf, ps, other]
Strong Converse Exponent for Degraded Broadcast Channels at Rates outside the Capacity Region
Abstract: We consider the discrete memoryless degraded broadcast channels. We prove that the error probability of decoding tends to one exponentially for rates outside the capacity region and derive an explicit lower bound of this exponent function. We shall demonstrate that the information spectrum approach is quite useful for investigating this problem.
Submitted 22 April, 2015; originally announced April 2015.
Comments: Short version of this paper is accepted for presentation at ISIT 2015
-
arXiv:1504.05891 [pdf, ps, other]
Exponent Function for One Helper Source Coding Problem at Rates outside the Rate Region
Abstract: We consider the one helper source coding problem posed and investigated by Ahlswede, Körner and Wyner. In this system, the error probability of decoding goes to one as the source block length $n$ goes to infinity. This implies that we have a strong converse theorem for the one helper source coding problem. In this paper we provide a much stronger version of this strong converse theorem for the one… ▽ More
Submitted 17 January, 2019; v1 submitted 22 April, 2015; originally announced April 2015.
Comments: 18 pages, 3 figures, short version of this paper was presented at ISIT 2015
-
arXiv:1301.7046 [pdf, ps, other]
Outer Bound of the Capacity Region for Identification via Multiple Access Channels
Abstract: In this paper we consider the identification (ID) via multiple access channels (MACs). In the general MAC the ID capacity region includes the ordinary transmission (TR) capacity region. In this paper we discuss the converse coding theorem. We estimate two types of error probabilities of identification for rates outside capacity region, deriving some function which serves as a lower bound of the su… ▽ More
Submitted 9 February, 2013; v1 submitted 29 January, 2013; originally announced January 2013.
Comments: This arXiv paper is a complete version of the paper submitted to IEEE ISIT 2013. After submission we found some minor mistakes in Property 1 b), Theorems 1 and 2 in the paper. In this arXiv version we have corrected those mistakes. A mistake in Version 4 in the description of the region C'(X,Y|W) in Property 2-b) is corrected in In the present version. Typos in the previous version are corrected
-
arXiv:1204.5663 [pdf, ps, other]
Cognitive Interference Channels with Confidential Messages under Randomness Constraint
Abstract: The cognitive interference channel with confidential messages (CICC) proposed by Liang et. al. is investigated. When the security is considered in coding systems, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. For the CICC, the trade-off between the rate of the random number to… ▽ More
Submitted 25 April, 2012; originally announced April 2012.
Comments: 10 pages, 1 figure. arXiv admin note: substantial text overlap with arXiv:1201.6468
-
arXiv:1201.6468 [pdf, ps, other]
Broadcast Channels with Confidential Messages by Randomness Constrained Stochastic Encoder
Abstract: In coding schemes for the wire-tap channel or the broadcast channels with confidential messages, it is well known that the sender needs to use a stochastic encoding to avoid the information about the transmitted confidential message to be leaked to an eavesdropper. In this paper, it is investigated that the trade-off between the rate of the random number to realize the stochastic encoding and the… ▽ More
Submitted 30 May, 2012; v1 submitted 31 January, 2012; originally announced January 2012.
Comments: 13 pages, 3 figures, In v2, references and a numerical example are added. A part of this paper will be presented at ISIT2012
-
arXiv:1009.5829 [pdf, ps, other]
Capacity Results for Relay Channels with Confidential Messages
Abstract: We consider a communication system where a relay helps transmission of messages from {a} sender to {a} receiver. The relay is considered not only as a helper but as a wire-tapper who can obtain some knowledge about transmitted messages. In this paper we study a relay channel with confidential messages(RCC), where a sender attempts to transmit common information to both a receiver and a relay and a… ▽ More
Submitted 29 September, 2010; v1 submitted 29 September, 2010; originally announced September 2010.
Comments: 31 pages, 8 figures
-
arXiv:1009.5760 [pdf, ps, other]
Secret Key Agreement from Vector Gaussian Sources by Rate Limited Public Communication
Abstract: We investigate the secret key agreement from correlated vector Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show that the optimal trade-off between the rate of key generation and the rate of the public communication is characterized as an optimization problem of a Gaussian r… ▽ More
Submitted 12 October, 2010; v1 submitted 28 September, 2010; originally announced September 2010.
Comments: 10 pages, 4 figures, A part of this paper was presented at 2010 IEEE International Symposium on Information Theory in Austin U.S.A, version 2 corrected Remark 6 and added some references
Journal ref: IEEE Transactions on Information Forensics and Security, Vol. 6, No. 3, pp. 541-550, 2011
-
arXiv:1008.1140 [pdf, ps, other]
On Two Strong Converse Theorems for Stationary Discrete Memoryless Channels
Abstract: In 1973, Arimoto proved the strong converse theorem for the discrete memoryless channels stating that when transmission rate $R$ is above channel capacity $C$, the error probability of decoding goes to one as the block length $n$ of code word tends to infinity. He proved the theorem by deriving the exponent function of error probability of correct decoding that is positive if and only if $R>C$. Su… ▽ More
Submitted 2 May, 2012; v1 submitted 6 August, 2010; originally announced August 2010.
Comments: 5 pages, 1 table
-
arXiv:1007.4418 [pdf, ps, other]
Distributed Source Coding of Correlated Gaussian Sources
Abstract: We consider the distributed source coding system of $L$ correlated Gaussian sources $Y_i,i=1,2,...,L$ which are noisy observations of correlated Gaussian remote sources $X_k, k=1,2,...,K$. We assume that $Y^{L}={}^{\rm t}(Y_1,Y_2,$ $..., Y_L)$ is an observation of the source vector $X^K={}^{\rm t}(X_1,X_2,..., X_K)$, having the form $Y^L=AX^K+N^L$, where $A$ is a $L\times K$ matrix and… ▽ More
Submitted 18 February, 2011; v1 submitted 26 July, 2010; originally announced July 2010.
Comments: 30 pages 4 figures
-
arXiv:1001.3705 [pdf, ps, other]
Secret Key Agreement from Correlated Gaussian Sources by Rate Limited Public Communication
Abstract: We investigate the secret key agreement from correlated Gaussian sources in which the legitimate parties can use the public communication with limited rate. For the class of protocols with the one-way public communication, we show a closed form expression of the optimal trade-off between the rate of key generation and the rate of the public communication. Our results clarify an essential differenc… ▽ More
Submitted 4 March, 2011; v1 submitted 20 January, 2010; originally announced January 2010.
Comments: 9 pages, no figure, Version 2 is a published version. The results are not changed from version 1. Explanations are polished
Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 11, pp. 1976-1983, November 2010
-
arXiv:0908.3982 [pdf, ps, other]
Distributed Source Coding for Correlated Memoryless Gaussian Sources
Abstract: We consider a distributed source coding problem of $L$ correlated Gaussian observations $Y_i, i=1,2,...,L$. We assume that the random vector $Y^{L}={}^{\rm t} (Y_1,Y_2,$ $...,Y_L)$ is an observation of the Gaussian random vector $X^K={}^{\rm t}(X_1,X_2,...,X_K)$, having the form $Y^L=AX^K+N^L ,$ where $A$ is a $L\times K$ matrix and $N^L={}^{\rm t}(N_1,N_2,...,N_L)$ is a vector of $L$ independen… ▽ More
Submitted 13 January, 2010; v1 submitted 27 August, 2009; originally announced August 2009.
Comments: 23 pages, 2 figures
-
arXiv:0904.0751 [pdf, ps, other]
Distributed Source Coding of Correlated Gaussian Remote Sources
Abstract: We consider the distributed source coding system for $L$ correlated Gaussian observations $Y_i, i=1,2, ..., L$. Let $X_i,i=1,2, ..., L$ be $L$ correlated Gaussian random variables and $N_i,$ $i=1,2,... L$ be independent additive Gaussian noises also independent of $X_i, i=1,2,..., L$. We consider the case where for each $i=1,2,..., L$, $Y_i$ is a noisy observation of $X_i$, that is,… ▽ More
Submitted 9 August, 2009; v1 submitted 5 April, 2009; originally announced April 2009.
Comments: 20 pages,3 figres
-
arXiv:0901.1988 [pdf, ps, other]
Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation
Abstract: In this paper we consider the separate coding problem for $L+1$ correlated Gaussian memoryless sources. We deal with the case where $L$ separately encoded data of sources work as side information at the decoder for the reconstruction of the remaining source. The determination problem of the rate distortion region for this system is the so called many-help-one problem and has been known as a highly… ▽ More
Submitted 7 May, 2024; v1 submitted 14 January, 2009; originally announced January 2009.
Comments: 21 pages, 4 figures
-
arXiv:cs/0611125 [pdf, ps, other]
Relay Channels with Confidential Messages
Abstract: We consider a relay channel where a relay helps the transmission of messages from one sender to one receiver. The relay is considered not only as a sender that helps the message transmission but as a wire-tapper who can obtain some knowledge about the transmitted messages. In this paper we study the coding problem of the relay channel under the situation that some of transmitted messages are con… ▽ More
Submitted 24 March, 2007; v1 submitted 24 November, 2006; originally announced November 2006.
Comments: 20 pages, 6 figures, submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security