{"title":"On the information rate of perfect secret sharing schemes","authors":"M. van Dijk","doi":"10.1109/ISIT.1994.395104","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395104","url":null,"abstract":"We present a method to derive information theoretical upper bounds on the information rate and average information rate of perfect secret sharing schemes. One of the applications is that in perfect secret sharing schemes for some access structures the shares need to be impractically large.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal cryptosystems and defining subliminal-freeness","authors":"Y. Desmedt, M. Yung","doi":"10.1109/ISIT.1994.394671","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394671","url":null,"abstract":"Previous definitions of subliminal-freeness lack an important aspect, as we discuss. We illustrate what was missing. To fix the old definition we introduce the concept of minimal cryptosystems.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Repeated communication and Ramsey graphs","authors":"N. Alon, A. Orlitsky","doi":"10.1109/ISIT.1994.394703","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394703","url":null,"abstract":"Studies the savings afforded by repeated use in two zero-error communication problems. 1. Channel coding: proving a correspondence between Ramsey numbers and independence numbers of normal graph powers, the authors show that some channels can communicate exponentially more bits in two uses than they can in one use, and that this is essentially the largest possible increase. Using probabilistic constructions of self-complementary Ramsey graphs, the authors show that similar results hold even when the number of transmissible bits is large relative to the channel's size. 2. Dual-source coding: using probabilistic colorings of directed line graphs, the authors show that there are dual sources where communicating one instance requires arbitrarily many bits, yet communicating many instances requires at most two bits per instance. For dual sources where the number of bits required for a single instance is comparable to the source's size, they employ probabilistic constructions of self-complementary Ramsey graphs that are also Cayley graphs to show that conveying two instances may require only a logarithmic number of additional bits over that needed to convey one instance.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prefixes and the entropy rate for long-range sources","authors":"Ioannis Kontoyiannis, Y. Suhov","doi":"10.1109/ISIT.1994.394774","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394774","url":null,"abstract":"The asymptotic a.s.-relation H=lim/sub n/spl rarr//spl infin//[(nlogn)/(/spl Sigma//sub i=1//sup n/L/sub i//sup n/(X))] is derived for any finite-valued stationary ergodic process X=(X/sub n/, n/spl isin/Z) that satisfies a Doeblin-type condition: there exists r/spl ges/1 such that ess/sub x/inf P(X/sub n+1/|x/sub /spl rarr//spl infin/,n/)/spl ges//spl alpha/>0. Here, H is the entropy rate of the process X, and L/sub i//sup n/(X) is the length of a shortest prefix in X which is initiated at time i and is not repeated among the prefixes initiated at times j, 1/spl les/i/spl ne/J/spl les/n. The validity of this limiting result was established by Shields in 1989 for i.i.d. processes and also for irreducible aperiodic Markov chains. Under our new condition, we prove that this holds for a wider class of processes, that may have infinite memory.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal detection based on adaptive array antenna in spatial and temporal domains","authors":"R. Kohno, M. Nagatsuka, H. Imai","doi":"10.1109/ISIT.1994.394995","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394995","url":null,"abstract":"This paper derives a generalized matched filter in spatial and temporal domains using an adaptive array antenna. The matched filter provides the optimal transfer function so as to maximize SINR (signal to interference-plus-noise ratio) in the array output. Moreover, if the generalized matched filter is followed by maximum likelihood sequence estimator in order to utilize memory in the channel, a generalized optimal receiver based on array antenna can be realized.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114811613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bayes coding algorithm using context tree","authors":"T. Matsushima, S. Hirasawa","doi":"10.1109/ISIT.1994.394633","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394633","url":null,"abstract":"The context tree weighting (CTW) algorithm [Willems et al., 1993] has high compressibility for universal coding with respect to FSMX sources. The present authors propose an algorithm by reinterpreting the CTW algorithm from the viewpoint of Bayes coding. This algorithm can be applied to a wide class of prior distribution for finite alphabet FSMX sources. The algorithm is regarded as both a generalized version of the CTW procedure and a practical algorithm using a context tree of the adaptive Bayes coding which has been studied in Mataushima et al. (1991). Moreover, the proposed algorithm is free from underflow which frequently occurs in the CTW procedure.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126647387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficacy of adaptive signal processing algorithms","authors":"G. Moustakides","doi":"10.1109/ISIT.1994.394846","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394846","url":null,"abstract":"A method for theoretically comparing a class of adaptive estimation algorithms is presented. The method consists in defining for each algorithm in the class a quantity (the efficacy) that is theoretically computable, that depends only on the statistics of the data. The larger the efficacy the better the algorithm performs.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inferring probabilistic acyclic automata using the minimum description length principle","authors":"Y. Singer, Naftali Tishby","doi":"10.1109/ISIT.1994.394627","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394627","url":null,"abstract":"The use of Rissanen's (1978) minimum description length principle for the construction of probabilistic acyclic automata (PAA) is explored. We propose a learning algorithm for a PAA that is adaptive both in the structure and the dimension of the model. The proposed algorithm was tested on synthetic data as well as on real pattern recognition problems.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132136878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subliminal-free sharing schemes","authors":"Y. Desmedt","doi":"10.1109/ISIT.1994.395105","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395105","url":null,"abstract":"Since Simmons (1984) discussed the fact that a secret message, which he called a subliminal channel, can be hidden inside the authenticator, many subliminal-free cryptosystems have been presented. We present a subliminal-free key distribution phase for a secret sharing scheme with a general access structure and discuss subliminal-free recomputation.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"28 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of overlapping multi-pulse pulse position modulation (OMPPM) in noisy photon counting channel","authors":"T. Ohtsuki, I. Sasase, S. Mori","doi":"10.1109/ISIT.1994.394890","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394890","url":null,"abstract":"Summary form only given. Overlapping multi-pulse pulse position modulation (OMPPM) is a modulation scheme to achieve a higher throughput than other conventional modulation schemes. Ohtsuki, Sasase and Mori (see Conf. Rec. ICC'93, p.1123-1127, 1993) analyzed OPPM in a noiseless photon counting channel and showed that it outperforms other conventional modulations. The optical channel is often modeled by a noiseless photon counting channel, but noise due to background and/or detector dark currents exists in a practical optical channel. However, the performance of OMPPM in a noisy photon counting channel has not been clarified. The article analyzes the cutoff rate performance of OMPPM in a noisy photon counting channel.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}