Skip to main content

Showing 1–20 of 20 results for author: Uyematsu, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:1906.02929  [pdf, ps, other

    cs.IT

    Coding Theorems for Asynchronous Slepian-Wolf Coding Systems

    Authors: Tetsunao Matsuta, Tomohiko Uyematsu

    Abstract: The Slepian-Wolf (SW) coding system is a source coding system with two encoders and a decoder, where these encoders independently encode source sequences from two correlated sources into codewords, and the decoder reconstructs both source sequences from the codewords. In this paper, we consider the situation in which the SW coding system is asynchronous, i.e., each encoder samples a source sequenc… ▽ More

    Submitted 7 June, 2019; originally announced June 2019.

    Comments: 35 pages, 4 figures, 2 tables, submitted to the IEEE Transactions on Information Theory

  2. arXiv:1901.03039  [pdf, ps, other

    cs.IT cs.SI math.ST

    On the Distance Between the Rumor Source and Its Optimal Estimate in a Regular Tree

    Authors: Tetsunao Matsuta, Tomohiko Uyematsu

    Abstract: This paper addresses the rumor source identification problem, where the goal is to find the origin node of a rumor in a network among a given set of nodes with the rumor. In this paper, we focus on a network represented by a regular tree which does not have any cycle and in which all nodes have the same number of edges connected to a node. For this network, we clarify that, with quite high probabi… ▽ More

    Submitted 21 January, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: fixed typos and proofs, 16 pages, 2 figures, a short version of this paper has been submitted to the 2019 IEEE International Symposium on Information Theory (ISIT 2019)

  3. An Information-Theoretical Analysis of the Minimum Cost to Erase Information

    Authors: Tetsunao Matsuta, Tomohiko Uyematsu

    Abstract: We normally hold a lot of confidential information in hard disk drives and solid-state drives. When we want to erase such information to prevent the leakage, we have to overwrite the sequence of information with a sequence of symbols independent of the information. The overwriting is needed only at places where overwritten symbols are different from original symbols. Then, the cost of overwrites s… ▽ More

    Submitted 29 June, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Comments: 11 pages, 1 figure, improved exposition of related studies, added examples in section 2 and some remarks, submitted to IEICE Trans. Fundamentals

  4. Non-Asymptotic Bounds and a General Formula for the Rate-Distortion Region of the Successive Refinement Problem

    Authors: Tetsunao Matsuta, Tomohiko Uyematsu

    Abstract: In the successive refinement problem, a fixed-length sequence emitted from an information source is encoded into two codewords by two encoders in order to give two reconstructions of the sequence. One of two reconstructions is obtained by one of two codewords, and the other reconstruction is obtained by all two codewords. For this coding problem, we give non-asymptotic inner and outer bounds on pa… ▽ More

    Submitted 29 June, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Comments: 15 pages, 1 figure, added a discussion of Theorems 2 and 3 in section 4 and some remarks, submitted to IEICE Trans. Fundamentals

  5. Key Rate of the B92 Quantum Key Distribution Protocol with Finite Qubits

    Authors: Hiroaki Sasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: The key rate of the B92 quantum key distribution protocol had not been reported before this research when the number of qubits is finite. We compute it by using the security analysis framework proposed by Scarani and Renner in 2008.

    Submitted 21 April, 2015; originally announced April 2015.

    Comments: 4 pages, 2 figures, IEEEtran.cls. Some overlap with arXiv:1301.5083. Accepted for presentation in 2015 IEEE International Symposium on Information Theory, Hong Kong, June 14-19, 2015

  6. arXiv:1301.5482  [pdf, other

    cs.IT cs.CR math.CO

    Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding

    Authors: Jun Kurihara, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: By extending the notion of minimum rank distance, this paper introduces two new relative code parameters of a linear code C_1 of length n over a field extension and its subcode C_2. One is called the relative dimension/intersection profile (RDIP), and the other is called the relative generalized rank weight (RGRW). We clarify their basic properties and the relation between the RGRW and the minimum… ▽ More

    Submitted 14 May, 2015; v1 submitted 23 January, 2013; originally announced January 2013.

    Comments: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE Transactions on Information Theory

  7. arXiv:1207.1936  [pdf, ps, other

    cs.IT cs.CR math.CO

    New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding

    Authors: Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto

    Abstract: The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes. Inspired by their result, this paper considers the secure network coding based on arbitrary linear codes, and investigates its security performance and error correction capability that are guaranteed inde… ▽ More

    Submitted 29 September, 2012; v1 submitted 8 July, 2012; originally announced July 2012.

    Comments: IEEEtran.cls, 8 pages, no figure. To appear in Proc. 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2012). Version 2 added an exact expression of the universal error correction capability in terms of the relative generalized rank weight

    Journal ref: Proceedings of 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.533 -- 540, 1--5 Oct. 2012

  8. arXiv:1004.3085  [pdf, ps, other

    cs.IT

    Universal Coding of Ergodic Sources for Multiple Decoders with Side Information

    Authors: Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu

    Abstract: A multiterminal lossy coding problem, which includes various problems such as the Wyner-Ziv problem and the complementary delivery problem as special cases, is considered. It is shown that any point in the achievable rate-distortion region can be attained even if the source statistics are not known.

    Submitted 18 April, 2010; originally announced April 2010.

    Comments: 9 pages, 4 figures

  9. Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers

    Authors: Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdrop** model where the eavesdroppers possess the ability to re-select the tap** links during the transmission. We give a proof for the impossibility of attaining universal security against such adversaries using Silva et al… ▽ More

    Submitted 1 November, 2010; v1 submitted 9 March, 2010; originally announced March 2010.

    Comments: 7 pages, no figure, ieice.cls, a part of this paper was presented in 2010 IEEE International Symposium on Information Theory. The proofs in V2 became more readable than V1, but the results unchanged

    Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 11, pp. 2026-2033, Nov. 2010

  10. Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code

    Authors: Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: The privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by the privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distan… ▽ More

    Submitted 7 March, 2011; v1 submitted 14 June, 2009; originally announced June 2009.

    Comments: 10 pages, no figure, A part of this paper will be presented at 2009 IEEE International Symposium on Information Theory in Seoul, Korea. Version 2 is a published version. The results are not changed from version 1. Explanations are polished and some references are added. In version 3, only style and DOI are edited

    Journal ref: IEICE Trans. Fundamentals, vol. 93, no. 9, pp. 1650-1659, September 2010

  11. On the Energy Benefit of Network Coding for Wireless Multiple Unicast

    Authors: Jasper Goseling, Ruytaroh Matsumoto, Tomohiko Uyematsu, Jos H. Weber

    Abstract: We consider the energy savings that can be obtained by employing network coding instead of plain routing in wireless multiple unicast problems. We establish lower bounds on the benefit of network coding, defined as the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. It is shown that if coding and routing sol… ▽ More

    Submitted 18 August, 2011; v1 submitted 16 January, 2009; originally announced January 2009.

    Journal ref: EURASIP Journal on Wireless Communications and Networking, Vol. 2010 (2010), Art.ID 605421

  12. Secret Key Agreement by Soft-decision of Signals in Gaussian Maurer's Model

    Authors: Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: We consider the problem of secret key agreement in Gaussian Maurer's Model. In Gaussian Maurer's model, legitimate receivers, Alice and Bob, and a wire-tapper, Eve, receive signals randomly generated by a satellite through three independent memoryless Gaussian channels respectively. Then Alice and Bob generate a common secret key from their received signals. In this model, we propose a protocol… ▽ More

    Submitted 18 April, 2008; originally announced April 2008.

    Comments: 10 pages, 4 figures, to be appear in Proc. of 2008 IEEE International Symposium on Information Theory in Toronto, Canada

    ACM Class: E.4

    Journal ref: IEICE Trans. Fundamentals, vol. 92, no. 2, pp. 525-534, February 2009

  13. arXiv:0804.1602  [pdf, ps, other

    cs.IT

    Multiterminal source coding with complementary delivery

    Authors: Akisato Kimura, Tomohiko Uyematsu

    Abstract: A coding problem for correlated information sources is investigated. Messages emitted from two correlated sources are jointly encoded, and delivered to two decoders. Each decoder has access to one of the two messages to enable it to reproduce the other message. The rate-distortion function for the coding problem and its interesting properties are clarified.

    Submitted 11 April, 2008; v1 submitted 9 April, 2008; originally announced April 2008.

    Comments: 13 pages in double-column format, 1 figure, submitted to IEICE Transactions on Fundamentals

  14. Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels

    Authors: Atsushi Okawado, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: We propose Dijkstra's algorithm with bounded list size after QR decomposition for decreasing the computational complexity of near maximum-likelihood (ML) detection of signals over multiple-input-multiple-output (MIMO) channels. After that, we compare the performances of proposed algorithm, QR decomposition M-algorithm (QRD-MLD), and its improvement. When the list size is set to achieve the almos… ▽ More

    Submitted 13 February, 2008; originally announced February 2008.

    Comments: 8 pages, two column, 14 figures, LaTeX2e

    Journal ref: Proceedings of 2008 IEEE International Symposium on Information Theory, pp. 2022-2025, 2008

  15. arXiv:0802.1567  [pdf, ps, other

    cs.IT

    Universal Coding for Lossless and Lossy Complementary Delivery Problems

    Authors: Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu

    Abstract: This paper deals with a coding problem called complementary delivery, where messages from two correlated sources are jointly encoded and each decoder reproduces one of two messages using the other message as the side information. Both lossless and lossy universal complementary delivery coding schemes are investigated. In the lossless case, it is demonstrated that a universal complementary delive… ▽ More

    Submitted 12 February, 2008; originally announced February 2008.

    Comments: 20 pages, one column, submitted to IEEE Transactions on Information Theory

  16. Universal source coding over generalized complementary delivery networks

    Authors: Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka, Shun Watanabe

    Abstract: This paper deals with a universal coding problem for a certain kind of multiterminal source coding network called a generalized complementary delivery network. In this network, messages from multiple correlated sources are jointly encoded, and each decoder has access to some of the messages to enable it to reproduce the other messages. Both fixed-to-fixed length and fixed-to-variable length loss… ▽ More

    Submitted 26 October, 2007; originally announced October 2007.

    Comments: 18 pages, one column, submitted to IEEE Transactions on Information Theory, presented at a recent result session in ISIT2007

    Journal ref: IEEE Transactions on Information Theory, Vol.55, No.3, pp.1360-1373, March 2009.

  17. Universal coding for correlated sources with complementary delivery

    Authors: Akisato Kimura, Tomohiko Uyematsu, Shigeaki Kuzuoka

    Abstract: This paper deals with a universal coding problem for a certain kind of multiterminal source coding system that we call the complementary delivery coding system. In this system, messages from two correlated sources are jointly encoded, and each decoder has access to one of the two messages to enable it to reproduce the other message. Both fixed-to-fixed length and fixed-to-variable length lossles… ▽ More

    Submitted 23 October, 2007; originally announced October 2007.

    Comments: 18 pages, some of the material in this manuscript has been already published in IEICE Transactions on Fundamentals, September 2007. Several additional results are also included

    Journal ref: IEICE Transactions on Fundamentals, Vol.E90-A, No.9, pp.1840-1847, September 2007

  18. Primal-dual distance bounds of linear codes with application to cryptography

    Authors: Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu

    Abstract: Let $N(d,d^\perp)$ denote the minimum length $n$ of a linear code $C$ with $d$ and $d^{\bot}$, where $d$ is the minimum Hamming distance of $C$ and $d^{\bot}$ is the minimum Hamming distance of $C^{\bot}$. In this paper, we show a lower bound and an upper bound on $N(d,d^\perp)$. Further, for small values of $d$ and $d^\perp$, we determine $N(d,d^\perp)$ and give a generator matrix of the optimu… ▽ More

    Submitted 12 June, 2006; v1 submitted 24 June, 2005; originally announced June 2005.

    Comments: 6 pages, using IEEEtran.cls. To appear in IEEE Trans. Inform. Theory, Sept. 2006. Two authors were added in the revised version

    Journal ref: IEEE Trans. Inform. Theory, vol. 52, no. 9, pp. 4251-4256, Sept. 2006

  19. arXiv:cs/0410041  [pdf, ps, other

    cs.IT

    Maximum Mutual Information of Space-Time Block Codes with Symbolwise Decodability

    Authors: Kenji Tanaka, Ryutaroh Matsumoto, Tomohiko Uyematsu

    Abstract: In this paper, we analyze the performance of space-time block codes which enable symbolwise maximum likelihood decoding. We derive an upper bound of maximum mutual information (MMI) on space-time block codes that enable symbolwise maximum likelihood decoding for a frequency non-selective quasi-static fading channel. MMI is an upper bound on how much one can send information with vanishing error… ▽ More

    Submitted 18 October, 2004; originally announced October 2004.

    Comments: 6 pages, 2 figures, using isita2004.sty, appeared in Proc. ISITA 2004, pp. 1025-1030, Parma, Italy, Oct. 10-13, 2004

  20. arXiv:cs/0410040  [pdf, ps, other

    cs.IT

    Two Methods for Decreasing the Computational Complexity of the MIMO ML Decoder

    Authors: Takayuki Fukatani, Ryutaroh Matsumoto, Tomohoko Uyematsu

    Abstract: We propose use of QR factorization with sort and Dijkstra's algorithm for decreasing the computational complexity of the sphere decoder that is used for ML detection of signals on the multi-antenna fading channel. QR factorization with sort decreases the complexity of searching part of the decoder with small increase in the complexity required for preprocessing part of the decoder. Dijkstra's al… ▽ More

    Submitted 17 October, 2004; originally announced October 2004.

    Comments: 6 pages, 6 figures, using a LaTeX style file ieice.cls

    Journal ref: IEICE Trans. Fundamentals, vol. E87-A, no. 10, pp. 2571-2576, Oct. 2004