-
Correction to "Private Information Retrieval Over Gaussian MAC"
Authors:
Or Elimelech,
Ori Shmuel,
Asaf Cohen
Abstract:
In the above article \cite{shmuel2021private}, the authors introduced a PIR scheme for the Additive White Gaussian Noise (AWGN) Multiple Access Channel (MAC), both with and without fading. The authors utilized the additive nature of the channel and leveraged the linear properties and structure of lattice codes to retrieve the desired message without the servers acquiring any knowledge on the retri…
▽ More
In the above article \cite{shmuel2021private}, the authors introduced a PIR scheme for the Additive White Gaussian Noise (AWGN) Multiple Access Channel (MAC), both with and without fading. The authors utilized the additive nature of the channel and leveraged the linear properties and structure of lattice codes to retrieve the desired message without the servers acquiring any knowledge on the retrieved message's index.
Theorems 3 and 4 in \cite{shmuel2021private} contain an error arising from the incorrect usage of the modulo operator. Moreover, the proofs assume a one-to-one map** function, $φ(\cdot)$, between a message $W_j\in\mathbb{F}_p^L$ and the elements of $\mathcal{C}$, mistakenly suggesting that the user possesses all the required information in advance. However, this is not the case. Herein, we present the corrected versions of these theorems.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Compute-and-Forward in Large Relaying Systems: Limitations and Asymptotically Optimal Scheduling
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Compute and Forward (CF) is a coding scheme which enables receivers to decode linear combinations of simultaneously transmitted messages while exploiting the linear properties of lattice codes and the additive nature of a shared medium. The scheme was originally designed for relay networks, yet, it was found useful in other communication problems, such as MIMO communication. Works in the current l…
▽ More
Compute and Forward (CF) is a coding scheme which enables receivers to decode linear combinations of simultaneously transmitted messages while exploiting the linear properties of lattice codes and the additive nature of a shared medium. The scheme was originally designed for relay networks, yet, it was found useful in other communication problems, such as MIMO communication. Works in the current literature assume a fixed number of transmitters and receivers in the system. However, following the increase in communication networks density, it is interesting to investigate the performance of CF when the number of transmitters is large.
In this work, we show that as the number of transmitters grows, CF becomes degenerated, in the sense that a relay prefers to decode only one (strongest) user instead of any other linear combination of the transmitted codewords, treating the other users as noise. Moreover, the system's sum-rate tends to zero as well. This makes scheduling necessary in order to maintain the superior abilities CF provides. We thus examine the problem of scheduling for CF. We start with insights on why good scheduling opportunities can be found. Then, we provide an asymptotically optimal, polynomial-time scheduling algorithm and analyze its performance. We conclude that with proper scheduling, CF is not merely non-degenerated, but, in fact, provides a gain for the system sum-rate, up to the optimal scaling law of $O(\log{\log{L}})$.
△ Less
Submitted 10 May, 2020;
originally announced May 2020.
-
Private Information Retrieval Over Gaussian MAC
Authors:
Ori Shmuel,
Asaf Cohen
Abstract:
Consider the problem of Private Information Retrieval (PIR), where a user wishes to retrieve a single message from $N$ non-communicating and non-colluding databases (servers). All servers store the same set of $M$ messages and they respond to the user through a block fading Gaussian Multiple Access Channel (MAC). The goal in this setting is to keep the index of the required message private from th…
▽ More
Consider the problem of Private Information Retrieval (PIR), where a user wishes to retrieve a single message from $N$ non-communicating and non-colluding databases (servers). All servers store the same set of $M$ messages and they respond to the user through a block fading Gaussian Multiple Access Channel (MAC). The goal in this setting is to keep the index of the required message private from the servers while minimizing the overall communication overhead.
This work provides joint privacy and channel coding retrieval schemes for the Gaussian MAC with and without fading. The schemes exploit the linearity of the channel while using the Compute and Forward (CF) coding scheme. Consequently, single-user encoding and decoding are performed to retrieve the private message. In the case of a channel without fading, the achievable retrieval rate is shown to outperform a separation-based scheme, in which the retrieval and the channel coding are designed separately. Moreover, this rate is asymptotically optimal as the SNR grows, and are up to a constant gap of $2$ bits per channel use from the channel capacity without privacy constraints, for all SNR values. When the channel suffers from fading, the asymmetry between the servers' channels forces a more complicated solution, which involves a hard optimization problem. Nevertheless, we provide coding scheme and lower bounds on the expected achievable retrieval rate which are shown to have the same scaling laws as the channel capacity, both in the number of servers and the SNR.
△ Less
Submitted 19 May, 2020; v1 submitted 11 January, 2020;
originally announced January 2020.
-
Multi-Antenna Jamming in Covert Communication
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, who tries to determine if a transmission took place or not. While covert communication in a basic, vanilla setting where all variables are known to Willie, results in the well-known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, a s…
▽ More
Covert communication conceals transmission of messages from Alice to Bob out of a watchful adversary, Willie, who tries to determine if a transmission took place or not. While covert communication in a basic, vanilla setting where all variables are known to Willie, results in the well-known square-root law, when a jammer is present and assists Alice by creating uncertainty in Willie's decoder, a strictly positive transmission rate is possible.
In this work, we analyze the case where the jammer is equipped with multiple antennas. Specifically, we analyze the effect of multiple antennas at the jammer on Alice's transmission power and consequently on the transmission rate. We consider both cases, one in which the channel knowledge is known and one in which it is unknown by the jammer. We formulate several optimization problems for the transmission strategies of the jammer, to maximize his assistance to Alice, in terms of maximizing a ratio between Willie's and Bob's noise variances.
When the channel information is known to the jammer, we show that the optimal strategy of the jammer is to perform beamforming towards a single direction with all his available power. This direction though, is not trivial, since it reflects an optimal tradeoff point between minimizing the interference at Bob and maximizing the interference at Willie. When the channel knowledge is unknown, we show that the optimal strategy of the jammer is either to transmit isotropically to all directions or to the null-space of Bob, where this choice depends on certain channel conditions. This is in contrast to current schemes in the literature. Furthermore, we extend the optimization problems to the case where Bob is also equipped with multiple antennas, and provide insightful results, shown to be asymptotically optimal, accompanied by simulations.
△ Less
Submitted 26 July, 2020; v1 submitted 9 January, 2020;
originally announced January 2020.
-
Asymptotically Optimal Scheduling for Compute-and-Forward
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Consider a Compute and Forward (CF) relay network with $L$ users and a single relay. The relay tries to decode a linear function of the transmitted signals. For such a network, letting all $L$ users transmit simultaneously, especially when $L$ is large, causes a significant degradation in the rate in which the relay is able to decode. In fact, the rate goes to zero very fast with $L$. Therefore, i…
▽ More
Consider a Compute and Forward (CF) relay network with $L$ users and a single relay. The relay tries to decode a linear function of the transmitted signals. For such a network, letting all $L$ users transmit simultaneously, especially when $L$ is large, causes a significant degradation in the rate in which the relay is able to decode. In fact, the rate goes to zero very fast with $L$. Therefore, in each transmission phase only a fixed number of users should transmit, i.e., users should be scheduled.
In this work, we examine the problem of scheduling for CF and lay the foundations for identifying the optimal schedule which, to date, lacks a clear understanding. Specifically, we start with insights why when the number of users is large, good scheduling opportunities can be found. Then, we provide an asymptotically optimal, polynomial time scheduling algorithm and analyze it's performance. We conclude that scheduling under CF provides a gain in the system sum-rate, up to the optimal scaling law of $O(\log{\log{L}})$.
△ Less
Submitted 6 November, 2018; v1 submitted 10 January, 2018;
originally announced January 2018.
-
Distributed Scheduling in Time Dependent Environments: Algorithms and Analysis
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Consider the problem of a multiple access channel in a time dependent environment with a large number of users. In such a system, mostly due to practical constraints (e.g., decoding complexity), not all users can be scheduled together, and usually only one user may transmit at any given time. Assuming a distributed, opportunistic scheduling algorithm, we analyse the system's properties, such as de…
▽ More
Consider the problem of a multiple access channel in a time dependent environment with a large number of users. In such a system, mostly due to practical constraints (e.g., decoding complexity), not all users can be scheduled together, and usually only one user may transmit at any given time. Assuming a distributed, opportunistic scheduling algorithm, we analyse the system's properties, such as delay, QoS and capacity scaling laws. Specifically, we start with analyzing the performance while \emph{assuming the users are not necessarily fully backlogged}, focusing on the queueing problem and, especially, on the \emph{strong dependence between the queues}. We first extend a known queueing model by Ephremides and Zhu, to give new results on the convergence of the probability of collision to its average value (as the number of users grows), and hence for the ensuing system performance metrics, such as throughput and delay. This model, however, is limited in the number of users one can analyze. We thus suggest a new model, which is much simpler yet can accurately describes the system behaviour when the number of users is large.
We then proceed to the analysis of this system under the assumption of time dependent channels. Specifically, we assume each user experiences a different channel state sequence, expressing different channel fluctuations (specifically, the Gilbert-Elliott model). The system performance under this setting is analysed, along with the channel capacity scaling laws.
△ Less
Submitted 12 September, 2017;
originally announced September 2017.
-
The Necessity of Scheduling in Compute-and-Forward
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Compute and Forward (CF) is a promising relaying scheme which, instead of decoding single messages or forwarding/amplifying information at the relay, decodes linear combinations of the simultaneously transmitted messages. The current literature includes several coding schemes and results on the degrees of freedom in CF, yet for systems with a fixed number of transmitters and receivers. It is uncle…
▽ More
Compute and Forward (CF) is a promising relaying scheme which, instead of decoding single messages or forwarding/amplifying information at the relay, decodes linear combinations of the simultaneously transmitted messages. The current literature includes several coding schemes and results on the degrees of freedom in CF, yet for systems with a fixed number of transmitters and receivers. It is unclear, however, how CF behaves at the limit of a large number of transmitters.
In this paper, we investigate the performance of CF in that regime. Specifically, we show that as the number of transmitters grows, CF becomes degenerated, in the sense that a relay prefers to decode only one (strongest) user instead of any other linear combination of the transmitted codewords, treating the other users as noise. Moreover, the sum-rate tends to zero as well. This makes scheduling necessary in order to maintain the superior abilities CF provides. Indeed, under scheduling, we show that non-trivial linear combinations are chosen, and the sum-rate does not decay, even without state information at the transmitters and without interference alignment.
△ Less
Submitted 22 May, 2017; v1 submitted 8 February, 2017;
originally announced February 2017.
-
Capacity and performance analysis for multi-user system under distributed opportunistic scheduling in a time dependent channel
Authors:
Ori Shmuel,
Asaf Cohen,
Omer Gurewitz
Abstract:
Consider the problem of a multi-user multiple access channel. While several multi-user coding techniques exist, in practical scenarios, not all users can be scheduled simultaneously. Thus, a key problem is which users to schedule in a given time slot. Under realistic approach for time dependency of the channel, we adopt a distributed scheduling algorithm in which each user, in the beginning of eac…
▽ More
Consider the problem of a multi-user multiple access channel. While several multi-user coding techniques exist, in practical scenarios, not all users can be scheduled simultaneously. Thus, a key problem is which users to schedule in a given time slot. Under realistic approach for time dependency of the channel, we adopt a distributed scheduling algorithm in which each user, in the beginning of each slot, estimates his channel gain and compares it to a threshold, and if exceeding it the user can transmit. In this work we are interested in the expected capacity of the system and the delay and quality of service of the data accumulated at the users under this scheduling scheme. First we derive the expected capacity under scheduling (distributed and centralized) for this time dependent environment and show that its scaling law is $O(σ_g\sqrt{2\log K}+μ_g)$, were $σ_g, μ_g$ are the good channel parameters (assuming Gaussian capacity approximation, e.g., under MIMO) and $K$ is the number of users. Then we turn to the performance analysis of such system while assuming the users are not necessarily fully backlogged, and focus specifically on the queueing problem and the strong dependence between the queues which leave no alternative but to turn to approximate models for this system. We adopt the celebrated model of Ephremides and Zhu to give new results on the convergence of the probability of collision to its average value (as the number of users grows), and hence for the ensuing system performance metrics, such as throughput and delay. We further utilize this finding to suggest a much simpler approximate model, which accurately describes the system behavior when the number of queues is large. The system performance as predicted by the approximate models shows excellent agreement with simulation results.
△ Less
Submitted 12 July, 2015;
originally announced July 2015.