{"title":"The Optimal Rate Memory Tradeoff in Multi-Access Coded Caching: Large Cache Size","authors":"P. VijithKumarK., B. K. Rai, T. Jacob","doi":"10.1109/ITW55543.2023.10161659","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161659","url":null,"abstract":"In this paper, we consider the (N,K,L) multi-access caching network where K users and K caches are connected to a server with N files, each of size F bits, through a shared error-free broadcast channel. Each user has access to L nearby caches, each of size MF bits, in a cyclic wrap-around manner. Even after several previous attempts, the exact characterization of the optimal rate memory tradeoff is still an open problem except in the case where L = K − 1 and L = 1 with large cache $M in left[ {frac{N}{L} cdot frac{{K - 1}}{K},frac{N}{L}} right]$. This paper determines the optimal rate memory tradeoff for the cache network with L = K − 2 and $M in left[ {frac{N}{{K - 2}} cdot frac{{K - 1}}{K},frac{N}{{K - 2}}} right]$. This is done by proposing a new caching scheme that operates at the memory rate pair $left( {frac{N}{{K - 2}},frac{{K - 1}}{K},frac{1}{K}} right)$ and deriving a set of lower bounds to demonstrate the optimality of the scheme.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123654064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized low rank parity check codes","authors":"Ermes Franch, P. Gaborit, Chunlei Li","doi":"10.1109/ITW55543.2023.10160243","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10160243","url":null,"abstract":"In this work we propose a family of ${mathbb{F}_q}$-linear lowrank parity check (LRPC) codes based on a bilinear product over $mathbb{F}_q^m$ defined by a generic 3-tensor over ${mathbb{F}_q}$. A particular choice of this tensor corresponds to the classical ${mathbb{F}_{{q^m}}}$-linear LRPC codes; and other tensors yield ${mathbb{F}_q}$-linear codes, which, with some caveats, can be efficiently decoded with the same idea of decoding LRPC codes. The proposed codes contribute to the diversity of rank metric codes for cryptographic applications, particularly for the cases where attacks utilize ${mathbb{F}_{{q^m}}}$-linearity to reduce decoding complexity.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fundamental Limits of Distributed Optimization over Multiple Access Channel","authors":"Shubham K. Jha, Prathamesh Mayekar","doi":"10.1109/ITW55543.2023.10161622","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161622","url":null,"abstract":"We consider distributed optimization over a d-dimensional space, where K remote clients send coded gradient estimates over an additive Gaussian Multiple Access Channel (MAC) with noise variance $sigma _z^2$. Furthermore, the codewords from the K clients must satisfy the average power constraint of P, resulting in a signal-to-noise ratio (SNR) of $KP/sigma _z^2$. In this paper, we study the fundamental limits imposed by MAC on the convergence rate of any distributed optimization algorithm and design optimal communication schemes to achieve these limits. Our first result is a lower bound for the convergence rate showing that compared to the centralized setting, communicating over a MAC imposes a slowdown of $sqrt {d/frac{1}{2}log (1 + {text{SNR}})}$ on any protocol. Next, we design a computationally tractable digital communication scheme that matches the lower bound to a logarithmic factor in K when combined with a projected stochastic gradient descent algorithm. At the heart of our communication scheme is a careful combination of several compression and modulation ideas such as quantizing along random bases, Wyner-Ziv compression, modulo-lattice decoding, and amplitude shift keying. We also show that analog coding schemes, which are popular due to their ease of implementation, can give close to optimal convergence rates at low SNR but experience a slowdown of roughly $sqrt d$ at high SNR.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction and Secrecy Gain of Formally Unimodular Lattices in Odd Dimensions","authors":"M. F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus","doi":"10.1109/ITW55543.2023.10160234","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10160234","url":null,"abstract":"In contrast to binary codes, odd-length self-dual codes exist over the integers modulo 4. Lately, the use of lattices constructed from codes over ℤ4 to guarantee secure communication in a Gaussian wiretap channel was proposed and shown to exceed the performance of lattices from binary codes. This performance is measured regarding the secrecy gain, a criterion that depends on a lattice’s volume and theta series. Formally unimodular lattices, i.e., lattices with the same theta series as their dual, have presented promising results with respect to the secrecy gain. While previous contributions in the literature were mainly focused on even-dimensional lattices, this paper addresses the secrecy gain of odd-dimensional formally unimodular lattices obtained from codes over ℤ4, together with a novel construction of such codes.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity Bounds for Broadcast Channels with Bidirectional Conferencing Decoders","authors":"R. K. Farsani, Wei Yu","doi":"10.1109/ITW55543.2023.10161680","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161680","url":null,"abstract":"The two-user broadcast channel (BC) with decoders connected by cooperative links of given capacities (known as conferencing decoders) is considered. A novel outer bound on the capacity region is established. This outer bound is derived using multiple applications of the Csiszár-Körner identity. A new achievable rate region for the channel is also presented which is derived by applying Marton’s coding as the transmission scheme, and quantize-bin-and-forward at one receiver and decode-and-forward at the other receiver as cooperative strategy. It is proved that the outer bound coincides with the achievable region for a class of semi-deterministic BCs with degraded message sets. This is the first capacity result for the two-user BC with bidirectional conferencing decoders. This result demonstrates that a one-round cooperation scheme is sufficient to achieve capacity for this class of semi-deterministic BCs with degraded message set. A capacity result is also derived for a new class of more capable semi-deterministic BCs with both common and private messages and one-sided conferencing.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"100 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retractable Commitment over Noisy Channels","authors":"Rémi A. Chou, M. Bloch","doi":"10.1109/ITW55543.2023.10161683","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161683","url":null,"abstract":"Consider a commitment protocol between two parties, Alice and Bob, in which Alice may (i) commit to a message using a non-redundant discrete memoryless channel whose outputs are observed by Bob; and (ii) later reveal her committed message to Bob who must decide whether Alice is revealing the message she actually committed to. A commitment protocol should meet three standard requirements: concealment, bindingness, and soundness, to ensure that no party may act dishonestly. Our objective is to study whether one can enforce a fourth requirement that would allow Alice to retract a commitment before the reveal phase starts without Bob detecting that she ever participated in the commit phase of the protocol. We positively answer this question and characterize the commitment capacity for such a setting by relying on tools developed for covert communication.A full version of the paper is available at https://bloch.ece.gatech.edu/ITWretractablecommitment.pdf.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BNNs- and TISTA- Based Signature Code Design for User Identification and Channel Estimation over Multiple-Access Channel with Rayleigh Fading","authors":"L. Wei, Shan Lu, H. Kamabe","doi":"10.1109/ITW55543.2023.10161674","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161674","url":null,"abstract":"User identification (UI) and channel estimation (CE) are essential in wireless networks with numerous users. Signature-code-based UI and CE schemes are widely used owing to their high spectral efficiency. Traditional signature code uses a discrete sensing matrix as a dictionary to generate codewords. Subsequently, the sparse vector recovery algorithm is used to recover the user state and channel state information in the received signal to complete the UI and CE. In this study, we propose an end-to-end machine-learning-aided signature code scheme under a multiple-access Rayleigh fading channel called machine-learning signature code (ML-SC). The ML-SC consists of a binarized-neural-networks-based (BNNs-based) trainable encoder and a trainable-iterative-soft-threshold-algorithm-based (TISTA-based) trainable decoder. To improve the accuracy, the dictionary is optimized by minimizing the mean squared error between the original and recovered information. Our proposed scheme achieved better performance and efficiency than the conventional schemes in the simulation. Moreover, it was confirmed that the dictionary generated by the ML-SC is suitable for various conventional decoders. Finally, by analyzing the results of the simulations, we found that ML-SC improves the restricted isometric constants and coherence of the dictionary.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability of Bernstein’s Characterization of Gaussian Vectors and a Soft Doubling Argument","authors":"Mohammad Mahdi Mahvari, G. Kramer","doi":"10.1109/ITW55543.2023.10161689","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161689","url":null,"abstract":"Stability properties of Bernstein’s characterization of Gaussian vectors are derived. Stability leads to a soft doubling argument through which one can prove capacity theorems without requiring the existence of capacity-achieving distributions.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132390121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robustness of Massive MIMO to Location and Phase Errors","authors":"Elhamsadat Anarakifirooz, S. Loyka","doi":"10.1109/ITW55543.2023.10160245","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10160245","url":null,"abstract":"The impact of random errors in element locations and beamforming phases on the performance of massive multipleinput multiple-output (MIMO) systems and their ability to cancel inter-user interference (IUI) are studied. For an arbitrary array geometry, user orthogonality, also known as “favorable propagation” (FP), is shown to hold asymptotically for the perturbed array as long as it holds for the unperturbed one, for independent (possibly non-Gaussian) errors. This means that small errors do not have catastrophic impact on the FP, even for a large number of antennas, and IUI can be reduced to any desired level. The negative impact of random errors is to slow down the convergence to the asymptotic value so that more antennas are needed under random errors to achieve the same low IUI as without errors. Practical design guidelines are given as to what implementation accuracy is needed to make the impact of random errors negligible and a closed-form estimate of IUI under random errors is presented. The analytical results are validated via numerical simulations and are in agreement with measurement-based studies.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matteo Abbondati, Antoine Afflatet, Eleonora Guerrini, R. Lebreton
{"title":"Probabilistic Analysis of LLL-based Decoder of Interleaved Chinese Remainder Codes","authors":"Matteo Abbondati, Antoine Afflatet, Eleonora Guerrini, R. Lebreton","doi":"10.1109/ITW55543.2023.10161639","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161639","url":null,"abstract":"To date, Li et al. have presented the only decoder for Interleaved Chinese Remainder (ICR) codes [1]. The core of their ICR decoder is to find a short vector in a lattice using the LLL algorithm [2]. However, their analysis of the decoding failure is partially heuristic. In this work, we present a new analysis of their LLL-based decoder that gives a proved upper bound on its decoding failure probability.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}