{"title":"Low-complexity wire-tap codes with security and error-correction guarantees","authors":"Yuval Cassuto, Z. Bandic","doi":"10.1109/CIG.2010.5592824","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592824","url":null,"abstract":"New code constructions are proposed for the wiretap channel with security and error-correction guarantees. For the case of error-free main channels, two families of codes are constructed with optimal encoding and decoding complexities for their wire-tap security. For the case of main channels with errors, two concatenation types are studied for the wire-tap and error-correcting codes. For each of these concatenated schemes, code families are constructed that give optimal cooperation between the wire-tap and error-correction properties. The motivation to study low-complexity wire-tap codes with security and error-correction guarantees comes from data storage applications. Due to imperfect physical erasure processes, important secret information needs to be protected from adversarial access to residual, post erasure, information, and at the same time be protected from errors when read by the legitimate device user.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computation of the robust symmetrical number system dynamic range","authors":"B. L. Luke, P. E. Pace","doi":"10.1109/CIG.2010.5592647","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592647","url":null,"abstract":"The robust symmetrical number system (RSNS) is a number theoretic transform formed using N ⋛ 2 integer sequences and ensures that two successive RSNS vectors (paired terms from all N sequences) differ by only one integer — integer Gray code property. The dynamic range M of the RSNS is defined as the greatest length of combined sequences that contain no ambiguities or repeated paired terms. For all but a select few RSNS sequences there is no closed-form solution to compute the dynamic range and its position. This paper presents an efficient algorithm for computing the dynamic range and its position. The dynamic range is shown to satisfy M < Pf where Pf is the RSNS fundamental period Pf = 2N Πmi. It then follows that M < M where M = Πmi is the dynamic range of the residue number system. An example is presented to demonstrate the algorithm. The efficiency of the algorithm is examined by comparing the speed of computation to a naive search algorithm (using MATLAB on a PC).","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115217522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-theoretic performance analysis of LMS MIMO communications","authors":"G. Alfano, A. Maio, A. Tulino","doi":"10.1109/CIG.2010.5592839","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592839","url":null,"abstract":"Information-theoretic performance analysis of a MIMO communication over Land Mobile Satellite (LMS) channels, under ergodic and non-ergodic regimes, is performed. The capacity-achieving input covariance matrix, and the corresponding ergodic capacity, assuming perfect receive-side information but making different assumptions on the amount of channel knowledge at the transmitter, are derived. We obtain exact results, but for the case when perfect channel knowledge is assumed at both ends of the link, for which we provide an upper bound to the ergodic capacity. In the non-ergodic scenario, we compute the outage capacity in absence of power-control, and discuss the asymptotic Gaussianity of the mutual information, which strongly depends on the overall number of degrees of freedom available on the channel. Design guidelines for multiantenna LMS channels are gained studying the low Signal-to-Noise Ratio (SNR) behavior of the capacity, still under the assumption of absence of knowledge of the channel matrix (or its statistics) at the transmitter. The results are illustrated through several examples, aimed at assessing the impact on the performance of the diversity order and/or the Line-of-Sight (LOS) fluctuations.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127535693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On LP decoding of polar codes","authors":"Naveen Goela, S. B. Korada, M. Gastpar","doi":"10.1109/CIG.2010.5592698","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592698","url":null,"abstract":"Polar codes are the first codes to provably achieve capacity on the symmetric binary-input discrete memoryless channel (B-DMC) with low encoding and decoding complexity. The parity check matrix of polar codes is high-density and we show that linear program (LP) decoding fails on the fundamental polytope of the parity check matrix. The recursive structure of the code permits a sparse factor graph representation. We define a new polytope based on the fundamental polytope of the sparse graph representation. This new polytope P is defined in a space of dimension O(N logN) where N is the block length. We prove that the projection of P in the original space is tighter than the fundamental polytope based on the parity check matrix. The LP decoder over P obtains the ML-certificate property. In the case of the binary erasure channel (BEC), the new LP decoder is equivalent to the belief propagation (BP) decoder operating on the sparse factor graph representation, and hence achieves capacity. Simulation results of SC (successive cancelation) decoding, LP decoding over tightened polytopes, and (ML) maximum likelihood decoding are provided. For channels other than the BEC, we discuss why LP decoding over P with a linear objective function is insufficient.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"43 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Every channel with time structure has a capacity sequence","authors":"R. Ahlswede","doi":"10.1109/CIG.2010.5592902","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592902","url":null,"abstract":"On August 25th 2008 we lectured at the workshop in Budapest which honored I. Csiszár in the year of his 70th birthday, on the result that for every AVC under maximal error probability pessimistic capacity and optimistic capacity are equal. This strongly motivated us to think again about performance criteria and we came back to what we called already a long time ago [1] a (weak) capacity function (now sequence!). But this time we were bold enough to conjecture the theorem below. Its proof was done in hours. In the light of this striking observation we omit now the word “weak” which came from the connection with the weak converse and make the following","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Access Wiretap channels with strong secrecy","authors":"Mohammad Hossein Yassaee, M. Aref","doi":"10.1109/CIG.2010.5592953","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592953","url":null,"abstract":"The problem of secure communication over Multiple-Access Wiretap channel (MAC-WTC) under strong secrecy criterion is investigated. A new technique based on channel output statistics approximation is developed for establishing the strong security over multi-user channels. In particular, this technique shows that how simple wiretap coding results in secure communication under strong secrecy criterion instead of weak secrecy criterion. As a side result of the paper, two results on the output statistics of MAC are provided. Such results can be used to approximate the mutual information between input and output of MAC with respect to a given codebook of arbitrary rate.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anna-Lena Horlemann-Trautmann, Felice Manganiello, J. Rosenthal
{"title":"Orbit codes — A new concept in the area of network coding","authors":"Anna-Lena Horlemann-Trautmann, Felice Manganiello, J. Rosenthal","doi":"10.1109/CIG.2010.5592788","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592788","url":null,"abstract":"We introduce a new class of constant dimension codes called orbit codes. The basic properties of these codes are derived. It will be shown that many of the known families of constant dimension codes in the literature are actually orbit codes.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The capacity region of the interference channel with a relay in the strong interference regime subject to phase fading","authors":"R. Dabora","doi":"10.1109/CIG.2010.5592746","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592746","url":null,"abstract":"The interference channel with a relay (ICR) is the fundamental building block of cooperation in wireless networks consisting of multiple communicating pairs. This work considers ICRs in which the links are subject to i.i.d. phase fading. Strong interference conditions are derived for the case where the links from the sources to the relay are good, leading to the characterization of the capacity region of the ICR for such scenarios. This is the first time the capacity region of this model is characterized for a non-degraded, non-cognitive scenario when all links are active and the SNRs are finite.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115842300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative ARQs with opportunistic distributed space-time coding: Effective protocols and performance analysis","authors":"Hsin-Li Chiu, Sau-Hsuan Wu, Jin-Hao Li","doi":"10.1109/CIG.2010.5592722","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592722","url":null,"abstract":"The paper studies effective protocols and corresponding performance of automatic retransmission request (ARQ) via decode-and-forward (DF) opportunistic distributed space-time coding (ODSTC). Analysis shows that the diversity via ARQ can be drastically increased by allowing non-active relays to overhear the DSTC signal sent by the active relays. Nevertheless, simple schemes without overhearing may also achieve the same diversity when the link quality between the source-relay or the relay-destination is good, hence greatly alleviating the need for a complex protocol with overhearing. Moreover, using more relays opportunistically does provide a higher coding gain if the source-relay channel quality is extremely good, otherwise using two or three relays gives almost the same performance as if using all of them.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129564483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coupled graphical models and their thresholds","authors":"Seyed Hamed Hassani, N. Macris, R. Urbanke","doi":"10.1109/CIG.2010.5592881","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592881","url":null,"abstract":"The excellent performance of convolutional low-density parity-check codes is the result of the spatial coupling of individual underlying codes across a window of growing size, but much smaller than the length of the individual codes. Remarkably, the belief-propagation threshold of the coupled ensemble is boosted to the maximum-a-posteriori one of the individual system. We investigate the generality of this phenomenon beyond coding theory: we couple general graphical models into a one-dimensional chain of large individual systems. For the later we take the Curie-Weiss, random field Curie-Weiss, If-satisfiability, and Q-coloring models. We always find, based on analytical as well as numerical calculations, that the message passing thresholds of the coupled systems come very close to the static ones of the individual models. The remarkable properties of convolutional low-density parity-check codes are a manifestation of this very general phenomenon.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}