{"title":"More efficient bounded-distance decoding of the Golay code and the Leech lattice","authors":"F. Sun, H. van Tilborg","doi":"10.1109/ISIT.1994.394620","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394620","url":null,"abstract":"New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the 'holy construction' with the octacode as the glue code. Further, we show that the 'holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification via wiretap channels","authors":"R. Ahlswede, Zhen Zhang","doi":"10.1109/ISIT.1994.394666","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394666","url":null,"abstract":"The wiretap channel can be viewed as a probabilistic model for cryptography. The channel has two outputs. One is for the legitimate receiver and the other is for the wiretapper. The goal of communication is to send messages to the legitimate receiver while the wiretapper must be kept ignorant. A wiretap channel is a quintuple (X,W(y|x),V(x|x),Y,Z), where X is the input alphabet, Y is the output alphabet for the legitimate receiver, Z is the output alphabet for the wiretapper, W(y|x) is the channel transition matrix, whose output is available to the legitimate receiver, and V(x|x) is the channel transition matrix, whose output is available to the wiretapper. The channel is assumed to be memoryless. In the classical transmission problem, an (n,M,/spl epsi/)-code for the wiretap channel is defined as a system {(c/sub i/,D/sub i/)|1/spl les/i/spl les/M}, where, for all i,c/sub i//spl isin/X/sup n/ are the codewords and D/sub i//spl sub/y/sup n/ are the disjoint decoding sets. It is required that for any i /spl lambda//sub i/=/sup def/W/sup n/(D/sub i//sup c/|c/sub i/)/spl les//spl epsi/, and if X/sup n/ has uniform distribution over {c/sub i/|/spl les/i/spl les/M}, then 1/nI(X/sup n/;Z/sup n/)/spl les//spl epsi/. The secret capacity of the wiretap channel is defined as the maximum rate of any code which satisfies these conditions. Formally, let M(n,/spl epsi/)=max{M:/spl exist/a(n,M,/spl epsi/) code}, then the secret capacity of the wiretap channel is defined as C/sub s/=max{R:/spl forall//spl epsi/>0,/spl exist/n such that M(n,C)/spl ges//sup nR/. The secret capacity of the wiretap channel can then be determined. The problem of identification via this channel is then formulated.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133275925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On computer search for good quasi-cyclic codes","authors":"Zhi Chen","doi":"10.1109/ISIT.1994.394929","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394929","url":null,"abstract":"As a generalization of cyclic codes, quasi-cyclic (QC) codes contain many good linear codes. A lot of work has been done to find good QC codes with help of computers, and many good QC codes have been found. It should be noted that an exhaustive search is intractable with the increase in the code dimensions. In this paper, a local search method is used to find good binary QC codes.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Fujiwara, T. Kasami, R. Morelos-Zaragoza, Shu Lin
{"title":"The state complexity of trellis diagrams for a class of generalized concatenated codes","authors":"T. Fujiwara, T. Kasami, R. Morelos-Zaragoza, Shu Lin","doi":"10.1109/ISIT.1994.395086","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395086","url":null,"abstract":"We discuss the state complexity of trellis diagrams for a class of generalized concatenated codes. The maximum number of states in the 64-section minimal trellis diagram for all the extended BCH codes of length 64 which are permuted by using the bases shown previously by Kasami et al. (1993), are the same as those obtained by Vardy and Be'ery (1993), where bit orderings were found by using DS structure and computer search. We construct several decomposable codes for which a multistage decoding up to the minimum distance can be employed. The dimensions of constructed codes are 47, 43 and 24 for length 63, and 52 and 32 for length 72. We also construct codes of length 64 as shortened codes of the codes with length 72.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of a DPCM system with a switched quantizer","authors":"Shay-Jan Huang, L. Davisson","doi":"10.1109/ISIT.1994.395075","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395075","url":null,"abstract":"Theoretical analysis of matched differential pulse code modulation (DPCM) of a first-order Gauss-Markov process has been done for a DPCM system with a uniform quantizer, an entropy constrained optimal uniform-threshold quantizer, and an adaptive step-size uniform quantizer. We design and analyze a DPCM system with a Lloyd-Max quantizer and a DPCM system with a switched quantizer (composed of a bank of Lloyd-Max quantizers and a switching rule; a a quantizer is chosen from this quantizer bank according to the switching rule) for a first-order Gauss-Markov process.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlay coding technique for supporting high data rates for DS-CDMA systems","authors":"E. Zehavi","doi":"10.1109/ISIT.1994.394743","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394743","url":null,"abstract":"Here we show an IS-95 based CDMA system architecture for personal communication services (PCS) that supports various data rates. This is achieved by using a technique called overlay coding where the code overlays symbols and generates a composite modulation symbol.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponentiation-based key generation using noncommutative groups","authors":"V. Sidelnikov","doi":"10.1109/ISIT.1994.395112","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395112","url":null,"abstract":"Diffie and Hellman (1976) proposed to use exponentiation module a prime for constructing the key generation system. A security of this system is based on the supposed hardness of the following problem (A): given /spl eta//sup x/ and /spl eta//sup y/ compute /spl eta//sup xy/. Sidelnikov, Cherepniov, and Yaschenko (1993) considered a system based on the noncommutative group G. We assume that G is a certain subgroup of the group GL/sub n/(F/sub p/) of n/spl times/n matrices over the finite field F/sub p/. We consider the representation of the group GL/sub n/(F/sub p/) with the aid of exponentiation in a subsidiary cyclic group U of order p and investigate of the security of the resulting key generation systems. The group of F/sub q/-rational point on elliptic curve and the subgroup U= of the multiplicative group of the subsidiary finite field F/sub q/, where p|q-1, /spl eta//spl isin/F/sub q/, /spl eta//sup p/=1, /spl eta//spl ne/1, are the examples of the group U. We consider the group /spl Uscr/ of affine transformations of the field F/sub p/ which is isomorphic to a certain subgroup of GL/sub 2/(F/sub p/). In this case the security of the key generation system under certain conjecture (which simplifies the task of adversary) is based on the hardness of the following problem (B): given /spl eta//sup x/,/spl eta//sup y/,/spl beta//sup z/ compute /spl eta//sup xy/z/. It seems impossible reduce this problem to several Diffie-Hellman problems (A). The system being considered uses a universal key, which does not exist in the Diffie-Hellman system and is presumably a new element for key generation systems. The knowledge of k is supposed to be a necessary condition to compute the private key.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the trellis structure of block codes","authors":"F. Kschischang, V. Sorokine","doi":"10.1109/ISIT.1994.394681","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394681","url":null,"abstract":"Two main results will be presented: 1. The problem of minimizing the number of states in the trellis for a general (nonlinear) code at a given time index is NP-complete, and thus apparently computationally infeasible for large codes. 2. Minimal linear block code trellises correspond to configurations of non-attacking rooks on a triangular chess board. This correspondence can be used to enumerate the minimal trellises, and also to obtain insight into various bounds on the size of the trellises.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stationary random functions and periodic clock changes","authors":"B. Lacaze, N. Aakvaag","doi":"10.1109/ISIT.1994.394717","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394717","url":null,"abstract":"Various physical phenomena are characterised by spectral line shifts or their multiplication. This is the case, for instance, with the Doppler effect and the Zeeman and Stark effects. Periodic clock changes acting on stationary random functions can serve as a probabilistic model for bilateral and symmetric frequency shifts.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123609244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A reliable signal detection method for the combination of PRML method and ternary recording code","authors":"S. Tazaki, T. Takashima, S. Tsuzuki, Y. Yamada","doi":"10.1109/ISIT.1994.394754","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394754","url":null,"abstract":"We focus our attention on a method for finding the merging state after the ACS (add compare select) operation in a Viterbi algorithm combined with the PR method and the ternary recording system. Firstly, the path shape matrix method is introduced with algebraic lucidity. Secondly, we propose a \"rosary\" style method that is far much simpler than the path shape matrix method.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}