{"title":"Keyless Covert Communication in the Presence of Non-causal Channel State Information","authors":"Hassan ZivariFard, M. Bloch, Aria Nosratinia","doi":"10.1109/ITW44776.2019.8989317","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989317","url":null,"abstract":"We consider the problem of covert communication over a state-dependent channel, for which the transmitter and the legitimate receiver have non-causal access to the channel state information. Covert communication with respect to an adversary, referred to as the “warden,” is one in which the distribution induced during communication at the channel output observed by the warden is identical to the output distribution conditioned on an inactive channel-input symbol. Covert communication involves fooling an adversary in part by a proliferation of codebooks; for reliable decoding at the legitimate receiver the codebook uncertainty is removed via a shared secret key that is unavailable to the warden. Unlike earlier work in state-dependent covert communication, we do not assume the availability of a shared key at the transmitter and legitimate receiver. Rather, a shared randomness is extracted at the transmitter and the receiver from the channel state, in a manner that keeps the shared randomness secret from the warden despite the influence of the channel state on the warden’s output. An inner bound on the covert capacity, in the absence of an externally provided secret key, is derived.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127310568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatially Coupled Sparse Regression Codes with Sliding Window AMP Decoding","authors":"Cynthia Rush, Kuan Hsieh, R. Venkataramanan","doi":"10.1109/ITW44776.2019.8989108","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989108","url":null,"abstract":"We analyze the performance of spatially coupled sparse regression codes (SC-SPARCs) over the AWGN channel with a sliding window approximate message passing (AMP) decoder. In an SC-SPARC, the codewords are sparse linear combinations of columns of a Gaussian matrix that has a block-wise band-diagonal structure. In this paper we introduce and motivate the sliding-window AMP decoder for SC-SPARCs, and present the first steps towards a fully rigorous proof that the SC-SPARCs with sliding window AMP decoding are asymptotically capacity-achieving. We also provide numerical simulation results demonstrating the error performance of the sliding window AMP decoder at finite code lengths.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Optimal Jamming in Strategic Communication","authors":"E. Akyol","doi":"10.1109/ITW44776.2019.8989298","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989298","url":null,"abstract":"This paper studies the well-known jamming problems in the context of strategic communication, a variation of the Bayesian Persuasion problem information economics. A communication problem with three agents, a transmitter, a receiver and a jammer, is considered. All players have diverging objectives: the transmitter and the receiver want to minimize their individual distortion functions while the jammer aims to maximize a convex combination of these functions. This leads to a hierarchical game whose equilibrium solutions are studied here. Here, the transmitter is the leader and hence announces an encoding strategy with full commitment, where the receiver acts as the follower. The game between the jammer and the transmitter-the receiver pair depends on the ability of this communicating pair to secretly agree on a random event, that is “common randomness”. In the presence of common randomness, the problem becomes a zero-sum game for which a saddle-point solution is sought. The saddle-point solution consists of randomized linear strategies for the communicating pair and additive independent Gaussian noise for the jammer. If common randomness is not available, then this problem does not admit a saddle-point solution. We derive and analyze the Stackelberg equilibrium between the communicating pair and the jammer, and show that equilibrium achieving strategies for all agents are linear/affine.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127130708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modular Semantically Secure Wiretap Code with Shared Key for Weakly Symmetric Channels","authors":"Setareh Sharifian, R. Safavi-Naini","doi":"10.1109/ITW44776.2019.8989345","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989345","url":null,"abstract":"We study the problem of secure communication over a wiretap channel when the sender and the receiver have access to a shared secret key. We propose a modular secure construction of wiretap codes for a shared key setting that achieves secrecy capacity for weakly symmetric wiretap channels, and has computationally efficient encoding and decoding. The construction’s security and reliability guarantees are in terms of semantic security, which is the strongest notion of security for these channels, and worst case error, respectively. We give concrete parameters of the construction for finite length messages to obtain a desired level of security and reliability.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stochastic Gradient Coding for Flexible Straggler Mitigation in Distributed Learning","authors":"Rawad Bitar, Mary Wootters, S. Rouayheb","doi":"10.1109/ITW44776.2019.8989328","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989328","url":null,"abstract":"We consider distributed gradient descent in the presence of stragglers. Recent work on gradient coding and approximate gradient coding have shown how to add redundancy in distributed gradient descent to guarantee convergence even if some workers are slow or non-responsive. In this work we propose a new type of approximate gradient coding which we call Stochastic Gradient Coding (SGC). The idea of SGC is very simple: we distribute data points redundantly to workers according to a good combinatorial design. We prove that the convergence rate of SGC mirrors that of batched Stochastic Gradient Descent (SGD) for the $l_{2}$ loss function, and show how the convergence rate can improve with the redundancy. We show empirically that SGC requires a small amount of redundancy to handle a large number of stragglers and that it can outperform existing approximate gradient codes when the number of stragglers is large.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random Coding Error Exponent for the Bee-Identification Problem","authors":"Anshoo Tandon, V. Tan, L. Varshney","doi":"10.1109/ITW44776.2019.8989304","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989304","url":null,"abstract":"Consider the problem of identifying a massive number of bees, uniquely labeled with barcodes, using noisy measurements. We introduce this “bee-identification problem characterize the random coding exponent, and derive efficiently computable bounds for this exponent. We demonstrate that joint decoding of barcodes has much better exponent than separate decoding followed by permutation inference.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"10 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131957487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Outage-Constrained Rate of Skip-Sliding Window Codes","authors":"Ting-Yi Wu, Anshoo Tandon, M. Motani, L. Varshney","doi":"10.1109/ITW44776.2019.8989220","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989220","url":null,"abstract":"We consider binary skip-sliding window (SSW) codes which satisfy certain weight constraints over a skip-sliding window. When on-off keying is employed, these weight constraints ensure real-time energy content in the transmitted signal. For a given energy requirement and battery size at an energy harvesting receiver, we investigate the maximum achievable rate using SSW codes which avoid energy outage at the receiver. The SSW codes generalize sliding window constrained (SWC) codes and subblock energy constrained (SEC) codes; we show that SSW codes with window length equal to twice the skip-length can outperform both SWC and SEC codes in terms of outage-constrained rate.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130286055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Designing Probabilistic Supports to Map the Entropy Region","authors":"J. Walsh, Alexander Erick Trofimoff","doi":"10.1109/ITW44776.2019.8989076","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989076","url":null,"abstract":"The boundary of the entropy region has been shown to determine fundamental inequalities and limits in key problems in network coding, streaming, distributed storage, and coded caching. The unknown part of this boundary requires nonlinear constructions, which can, in turn, be parameterized by the support of their underlying probability distributions. Recognizing that the terms in entropy are submodular enables the design of such supports to maximally push out towards this boundary.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132847632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Minrank of Symmetric and Neighboring Side-information Index Coding Problems","authors":"Mahesh Babu Vaddi, B. Rajan","doi":"10.1109/ITW44776.2019.8989268","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989268","url":null,"abstract":"The length of an optimal scalar linear index code of a single unicast index coding problem (SUICP) is equal to the minrank of its side-information graph. A single unicast index coding problem is called symmetric neighboring and consecutive (SNC) side-information problem if it has $K$ messages and $K$ receivers, the $kmathrm {t}mathrm {h}$ receiver $R_{k}$ wanting the $kmathrm {t}mathrm {h}$ message $x_{k}$ and having the side-information $D$ messages immediately after $x_{k}$ and $U (D~geq ~U)$ messages immediately before $x_{k}$. Maleki, Cadambe and Jafar obtained the capacity of this SUICP(SNC) and proposed $(U+1)$-dimensional optimal length vector linear index codes by using Vandermonde matrices. However, for a ${b}$- dimensional vector linear index code, the transmitter needs to wait for $b$ realizations of each message and hence the latency introduced at the transmitter is proportional to $b$. For any given single unicast index coding problem with the side-information graph $G$, MAIS (${G}$) is used to give a lowerbound on the broadcast rate of the ICP. In this paper, we analyse the properties of minrank of SUICP(SNC) side-information graph. We derive the MAIS (${G}$) of side-information graph $G$ of SUICP(SNC). For arbitrary $K, D$ and $U$, we construct scalar linear index codes for SUICP(SNC) with length $displaystyle lceil frac {K}{U+1}rceil - displaystyle lfloor frac {D-U}{U+1}rfloor $. We obtain the minrank of SUICP(SNC) side-information graph and show that the length of the constructed scalar linear index codes is equal to minrank of SUICP(SNC) side-information graph for some combinations of K, D and ${U}$.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133804823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hsuan-Yin Lin, Siddhartha Kumar, E. Rosnes, A. G. Amat
{"title":"Improved Private Information Retrieval for Coded Storage From Code Decomposition : (Invited Paper)","authors":"Hsuan-Yin Lin, Siddhartha Kumar, E. Rosnes, A. G. Amat","doi":"10.1109/ITW44776.2019.8989190","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989190","url":null,"abstract":"We consider private information retrieval (PIR) for distributed storage systems with noncolluding nodes where data is stored using a non maximum distance separable (MDS) linear code. Recently, it was shown that when data is stored using certain non-MDS codes, the MDS-PIR capacity can be achieved, and is indeed the capacity of the system. In this paper, for storage codes not belonging to this class, we present a heuristic algorithm for their decomposition into punctured subcodes and a PIR protocol based on these punctured subcodes. The code decomposition is guided by the generalized Hamming weights of the storage code. We show that the proposed PIR protocol can achieve a larger PIR rate than that of all existing PIR protocols.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133404974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}