{"title":"Optimal Trace Codes and Their Self-Orthogonality","authors":"Jong Yoon Hyun;Zhao Hu;Eun Ju Cheon;Yansheng Wu","doi":"10.1109/TIT.2025.3559453","DOIUrl":"https://doi.org/10.1109/TIT.2025.3559453","url":null,"abstract":"The primary objective of this paper is the construction of optimal codes with self-orthogonality that can be used to construct quantum codes. Recently, Ding and Heng explored subfield codes, which can be viewed as trace codes. In this paper, we focus on investigating self-orthogonal optimal trace codes. First, we provide a novel description of trace codes by choosing suitable defining sets. Second, we determine the parameters of the codes and their trace codes whose defining sets are disjoint union of some affine subspaces in both non-projective cases and projective-cases. This result extends the main findings in Hu et al. (2022). Third, we compute the parameters of trace codes for MacDonald codes, including the first order Reed-Muller codes and simplex codes as special cases. Finally, we examine their self-orthogonality and distance-optimality to find several classes of self-orthogonal Griesmer codes. Additionally, we resolve a problem proposed by Ding and Heng as a byproduct.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4267-4283"},"PeriodicalIF":2.2,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Best Approximation by Finite Gaussian Mixtures","authors":"Yun Ma;Yihong Wu;Pengkun Yang","doi":"10.1109/TIT.2025.3558841","DOIUrl":"https://doi.org/10.1109/TIT.2025.3558841","url":null,"abstract":"We consider the problem of approximating a general Gaussian location mixture by finite mixtures. The minimum order of finite mixtures that achieve a prescribed accuracy is determined within constant factors for the family of mixing distributions with compact support or appropriate assumptions on the tail probability including subgaussian and subexponential. While the upper bound is achieved using the technique of local moment matching, the lower bound is established by relating the best approximation error to the low-rank approximation of certain trigonometric moment matrices, followed by a refined spectral analysis of their minimum eigenvalue. In the case of Gaussian mixing distributions, this result corrects a previous lower bound.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 7","pages":"5469-5492"},"PeriodicalIF":2.2,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144331823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear Programming Bound on Frequency Hopping Sequences","authors":"Xing Liu","doi":"10.1109/TIT.2025.3558949","DOIUrl":"https://doi.org/10.1109/TIT.2025.3558949","url":null,"abstract":"There are several theoretical bounds on frequency hopping (FH) sequences. Each bound is tight in most cases while not tight in some other cases. Besides, the linear programming bound on FH sequences directly converted from that on error correcting codes can be made to be tighter due to the special structure of FH sequences. In this paper, we first give some properties of FH sequences and derive an inequality relationship between FH sequences and Krawtchouk polynomials. By utilizing those properties of FH sequences and the inequality relationship, we establish a linear programming bound on FH sequences. It is actually a nonlinear programming bound for <inline-formula> <tex-math>$gcd (H_{m}+1,N)neq 1$ </tex-math></inline-formula> and <inline-formula> <tex-math>$sum _{j=0}^{H_{m}}A_{j}geq q^{H_{m}+1}-q^{frac {H_{m}+1}{gcd (H_{m}+1,N)}}-1$ </tex-math></inline-formula>, but not difficult to be solved. It is showed that the linear programming bound is tighter than the Peng-Fan bound (Plotkin bound), the sphere-packing bound, the Singleton bound, and the improved Singleton bound in some cases.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4797-4805"},"PeriodicalIF":2.2,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security, Latency, and Throughput of Proof-of-Work Nakamoto Consensus","authors":"Shu-Jie Cao;Dongning Guo","doi":"10.1109/TIT.2025.3557761","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557761","url":null,"abstract":"This paper investigates the fundamental trade-offs between block safety, confirmation latency, and transaction throughput of proof-of-work (PoW) longest-chain fork-choice protocols, also known as PoW Nakamoto consensus. New upper and lower bounds are derived for the probability of block safety violations as a function of honest and adversarial mining rates, a block propagation delay limit, and confirmation latency measured in both time and block depth. The results include the first non-trivial closed-form finite-latency bound applicable across all delays and mining rates up to the ultimate fault tolerance. Notably, the gap between these upper and lower bounds is narrower than previously established bounds for a wide range of parameters relevant to Bitcoin and its derivatives, including Litecoin and Dogecoin, as well as Ethereum Classic. Additionally, the study uncovers a fundamental trade-off between transaction throughput and confirmation latency, ultimately determined by the desired fault tolerance and the rate at which block propagation delay increases with block size.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4708-4731"},"PeriodicalIF":2.2,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Near Optimal Probabilistic Constructions of Frameproof Codes","authors":"Miao Liu;Zengjiao Ma;Chong Shangguan","doi":"10.1109/TIT.2025.3558360","DOIUrl":"https://doi.org/10.1109/TIT.2025.3558360","url":null,"abstract":"Frameproof codes are a class of secure codes that were originally introduced in the pioneering work of Boneh and Shaw in the context of digital fingerprinting. They can be used to enhance the security and credibility of digital contents. Let <inline-formula> <tex-math>$M_{c,l}(q)$ </tex-math></inline-formula> denote the largest cardinality of a <italic>q</i>-ary <italic>c</i>-frameproof code with length <italic>l</i>. Based on an intriguing observation that relates <inline-formula> <tex-math>$M_{c,l}(q)$ </tex-math></inline-formula> to the renowned Erdős Matching Conjecture in extremal set theory, in 2003, Blackburn posed an open problem on the precise value of the limit <inline-formula> <tex-math>$R_{c,l}=lim _{qrightarrow infty }frac {M_{c,l}(q)}{q^{lceil l/c rceil }}$ </tex-math></inline-formula>. By combining several ideas from the probabilistic method, we present a lower bound for <inline-formula> <tex-math>$M_{c,l}(q)$ </tex-math></inline-formula>, which, together with an upper bound of Blackburn, completely determines <inline-formula> <tex-math>$R_{c,l}$ </tex-math></inline-formula> for <italic>all</i> fixed <inline-formula> <tex-math>$c,l$ </tex-math></inline-formula>, and resolves the above open problem in the full generality. We also present an improved upper bound for <inline-formula> <tex-math>$M_{c,l}(q)$ </tex-math></inline-formula>.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4137-4144"},"PeriodicalIF":2.2,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Inequalities via Ideas From Additive Combinatorics","authors":"Chin Wa Lau;Chandra Nair","doi":"10.1109/TIT.2025.3557796","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557796","url":null,"abstract":"Ruzsa’s equivalence theorem provided a framework for converting certain families of inequalities in additive combinatorics to entropic inequalities (which sometimes did not possess stand-alone entropic proofs). In this work, we first establish formal equivalences between some families (different from Ruzsa) of inequalities in additive combinatorics and entropic ones. As a first step to further these equivalences, we establish an information-theoretic characterization of the magnification ratio that could also be of independent interest.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4055-4068"},"PeriodicalIF":2.2,"publicationDate":"2025-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Bounds for the Optimal Density of Covering Single-Insertion Codes via the Turán Density","authors":"Oleg Pikhurko;Oleg Verbitsky;Maksim Zhukovskii","doi":"10.1109/TIT.2025.3557393","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557393","url":null,"abstract":"We prove that the density of any covering single-insertion code <inline-formula> <tex-math>$Csubseteq X^{r}$ </tex-math></inline-formula> over the <italic>n</i>-symbol alphabet <italic>X</i> cannot be smaller than <inline-formula> <tex-math>$1/r+delta _{r}$ </tex-math></inline-formula> for some positive real <inline-formula> <tex-math>$delta _{r}$ </tex-math></inline-formula> not depending on <italic>n</i>. This improves the volume lower bound of <inline-formula> <tex-math>$1/(r+1)$ </tex-math></inline-formula>. On the other hand, we observe that, for all sufficiently large <italic>r</i>, if <italic>n</i> tends to infinity then the asymptotic upper bound of <inline-formula> <tex-math>$7/(r+1)$ </tex-math></inline-formula> due to Lenz et al. (2021) can be improved to <inline-formula> <tex-math>$4.911/(r+1)$ </tex-math></inline-formula>. Both the lower and the upper bounds are achieved by relating the code density to the Turán density from extremal combinatorics. For the last task, we use the analytic framework of measurable subsets of the real cube <inline-formula> <tex-math>$[{0,1}]^{r}$ </tex-math></inline-formula>.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4260-4266"},"PeriodicalIF":2.2,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10948504","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Zhengyu Huang;Jiaoyang Huang;Zhengjiang Lin
{"title":"Convergence Analysis of Probability Flow ODE for Score-Based Generative Models","authors":"Daniel Zhengyu Huang;Jiaoyang Huang;Zhengjiang Lin","doi":"10.1109/TIT.2025.3557050","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557050","url":null,"abstract":"Score-based generative models have emerged as a powerful approach for sampling high-dimensional probability distributions. Despite their effectiveness, their theoretical underpinnings remain relatively underdeveloped. In this work, we study the convergence properties of deterministic samplers based on probability flow ODEs from both theoretical and numerical perspectives. Assuming access to <inline-formula> <tex-math>$L^{2}$ </tex-math></inline-formula>-accurate estimates of the score function, we prove the total variation between the target and the generated data distributions can be bounded above by <inline-formula> <tex-math>${mathcal {O}}(d^{3/4}delta ^{1/2})$ </tex-math></inline-formula> in the continuous time level, where <italic>d</i> denotes the data dimension and <inline-formula> <tex-math>$delta $ </tex-math></inline-formula> represents the <inline-formula> <tex-math>$L^{2}$ </tex-math></inline-formula>-score matching error. For practical implementations using a <italic>p</i>-th order Runge-Kutta integrator with step size <italic>h</i>, we establish error bounds of <inline-formula> <tex-math>${mathcal {O}}(d^{3/4}delta ^{1/2} + dcdot (dh)^{p})$ </tex-math></inline-formula> at the discrete level. Finally, we present numerical studies on problems up to 128 dimensions to verify our theory.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4581-4601"},"PeriodicalIF":2.2,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entanglement Measures for Detectability","authors":"Masahito Hayashi;Yuki Ito","doi":"10.1109/TIT.2025.3557056","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557056","url":null,"abstract":"We propose new entanglement measures as the detection performance based on the hypothesis testing setting. We clarify how our measures work for detecting an entangled state by extending the quantum Sanov theorem. Our analysis covers the finite-length setting. Exploiting this entanglement measure, we present how to derive an entanglement witness to detect the given entangled state by using the geometrical structure of this measure. We derive their calculation formulas for maximally correlated states, and propose their algorithms that work for general entangled states. In addition, we investigate how our algorithm works for solving the membership problem for separability. Further, employing this algorithm, we propose a method to find entanglement witness for a given entangled state.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4385-4405"},"PeriodicalIF":2.2,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal, Almost Optimal Few-Weight Linear Codes and Related Quantum Codes","authors":"Conghui Xie;Hao Chen;Haiyan Zhou;Yang Li;Huimin Lao","doi":"10.1109/TIT.2025.3557315","DOIUrl":"https://doi.org/10.1109/TIT.2025.3557315","url":null,"abstract":"In eight published papers in IEEE Transactions on Information Theory, infinite families of optimal few-weight binary and <italic>q</i>-ary linear codes were constructed and their weight distributions were determined. These codes are linear codes meeting the Griesmer bound. We indicate that many Griesmer codes constructed in these papers are not new. They are actually Solomon-Stiffler codes invented in 1965. Therefore weight distributions of some special binary or <italic>q</i>-ary Solomon-Stiffler codes were determined in the papers mentioned above. From a similar geometric approach as Solomon-Stiffler codes, we construct ten infinite families of binary, ternary and quaternary few-weight, optimal, almost optimal and near-optimal linear codes close to the Griesmer bound and their weight distributions are determined. These linear codes have positive Griesmer defects up to five, and thus not Solomon-Stiffler codes and Griesmer codes from minihypers. Moreover, many optimal, best known and almost optimal quantum codes of small lengths, comparing with Grassl’s table on quantum codes, are constructed from the same geometric approach as binary Solomon-Stiffler codes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4250-4259"},"PeriodicalIF":2.2,"publicationDate":"2025-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}