{"title":"A Generalization of Axiomatic Approach to Information Leakage","authors":"Mohammad Amin Zarrabian, Parastoo Sadeghi","doi":"arxiv-2409.04108","DOIUrl":"https://doi.org/arxiv-2409.04108","url":null,"abstract":"In this paper, we extend the framework of quantitative information flow (QIF)\u0000to include adversaries that use Kolmogorov-Nagumo $f$-mean to infer secrets of\u0000a private system. Specifically, in our setting, an adversary uses\u0000Kolmogorov-Nagumo $f$-mean to compute its best actions before and after\u0000observing the system's randomized outputs. This leads to generalized notions of\u0000prior and posterior vulnerability and generalized axiomatic relations that we\u0000will derive to elucidate how these $f$-mean based vulnerabilities interact with\u0000each other. We demonstrate usefulness of this framework by showing how some\u0000notions of leakage that had been derived outside of the QIF framework and so\u0000far seemed incompatible with it are indeed explainable via such extension of\u0000QIF. These leakage measures include $alpha$-leakage, which is the same as\u0000Arimoto mutual information of order $alpha$, maximal $alpha$-leakage which is\u0000the $alpha$-leakage capacity, and $(alpha,beta)$ leakage, which is a\u0000generalization of the above and captures local differential privacy as a\u0000special case. We also propose a new pointwise notion of gain function, which we\u0000coin pointwise information gain. We show that this pointwise information gain\u0000can explain R'eyni divergence and Sibson mutual information of order $alpha\u0000in [0,infty]$ as the Kolmogorov-Nagumo average of the gain with a proper\u0000choice of function $f$.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Konrad Aguilar, Angelynn Álvarez, René Ardila, Pablo S. Ocal, Cristian Rodriguez Avila, Anthony Várilly-Alvarado
{"title":"Locally recoverable algebro-geometric codes with multiple recovery sets from projective bundles","authors":"Konrad Aguilar, Angelynn Álvarez, René Ardila, Pablo S. Ocal, Cristian Rodriguez Avila, Anthony Várilly-Alvarado","doi":"arxiv-2409.04201","DOIUrl":"https://doi.org/arxiv-2409.04201","url":null,"abstract":"A code is locally recoverable when each symbol in one of its code words can\u0000be reconstructed as a function of $r$ other symbols. We use bundles of\u0000projective spaces over a line to construct locally recoverable codes with\u0000availability; that is, evaluation codes where each code word symbol can be\u0000reconstructed from several disjoint sets of other symbols. The simplest case,\u0000where the code's underlying variety is a plane, exhibits noteworthy properties:\u0000When $r = 1$, $2$, $3$, they are optimal; when $r geq 4$, they are optimal\u0000with probability approaching $1$ as the alphabet size grows. Additionally,\u0000their information rate is close to the theoretical limit. In higher dimensions,\u0000our codes form a family of asymptotically good codes.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-latency Secure Integrated Sensing and Communication with Transmitter Actions","authors":"Truman Welling, Onur Günlü, Aylin Yener","doi":"arxiv-2409.04619","DOIUrl":"https://doi.org/arxiv-2409.04619","url":null,"abstract":"This paper considers an information theoretic model of secure integrated\u0000sensing and communication, represented as a wiretap channel with action\u0000dependent states. This model allows securing part of a transmitted message\u0000against a sensed target that eavesdrops the communication, while enabling\u0000transmitter actions to change the channel statistics. An exact\u0000secrecy-distortion region is given for a physically-degraded channel. A\u0000finite-length achievability region is established for the model using an output\u0000statistics of random binning method, giving an achievable bound for low-latency\u0000applications.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fuwang Dong, Fan Liu, Yifeng Xiong, Yuanhao Cui, Wei Wang, Shi Jin
{"title":"Communication-Assisted Sensing Systems: Fundamental Limits and ISAC Waveform Design","authors":"Fuwang Dong, Fan Liu, Yifeng Xiong, Yuanhao Cui, Wei Wang, Shi Jin","doi":"arxiv-2409.03561","DOIUrl":"https://doi.org/arxiv-2409.03561","url":null,"abstract":"The communication-assisted sensing (CAS) systems are expected to endow the\u0000users with beyond-line-of-sight sensing capabilities without the aid of\u0000additional sensors. In this paper, we study the dual-functional signaling\u0000strategy, focusing on three primary aspects, namely, the information-theoretic\u0000framework, the optimal distribution of channel input, and the optimal waveform\u0000design for Gaussian signals. First, we establish the information-theoretic\u0000framework and develop a modified source-channel separation theorem (MSST)\u0000tailored for CAS systems. The proposed MSST elucidates the relationship between\u0000achievable distortion, coding rate, and communication channel capacity in cases\u0000where the distortion metric is separable for sensing and communication (S&C)\u0000processes. Second, we present an optimal channel input design for\u0000dual-functional signaling, which aims to minimize total distortion under the\u0000constraints of the MSST and resource budget. We then conceive a two-step\u0000Blahut-Arimoto (BA)-based optimal search algorithm to numerically solve the\u0000functional optimization problem. Third, in light of the current signaling\u0000strategy, we further propose an optimal waveform design for Gaussian signaling\u0000in multi-input multi-output (MIMO) CAS systems. The associated covariance\u0000matrix optimization problem is addressed using a successive convex\u0000approximation (SCA)-based waveform design algorithm. Finally, we provide\u0000numerical simulation results to demonstrate the effectiveness of the proposed\u0000algorithms and to show the unique performance tradeoff between S&C processes.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"161 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Optimal Performance of Distributed Cell-Free Massive MIMO with LoS Propagation","authors":"Noor Ul Ain, Lorenzo Miretti, Sławomir Stańczak","doi":"arxiv-2409.03551","DOIUrl":"https://doi.org/arxiv-2409.03551","url":null,"abstract":"In this study, we revisit the performance analysis of distributed beamforming\u0000architectures in dense user-centric cell-free massive multiple-input\u0000multiple-output (mMIMO) systems in line-of-sight (LoS) scenarios. By\u0000incorporating a recently developed optimal distributed beamforming technique,\u0000called the team minimum mean square error (TMMSE) technique, we depart from\u0000previous studies that rely on suboptimal distributed beamforming approaches for\u0000LoS scenarios. Supported by extensive numerical simulations that follow 3GPP\u0000guidelines, we show that such suboptimal approaches may often lead to\u0000significant underestimation of the capabilities of distributed architectures,\u0000particularly in the presence of strong LoS paths. Considering the anticipated\u0000ultra-dense nature of cell-free mMIMO networks and the consequential high\u0000likelihood of strong LoS paths, our findings reveal that the team MMSE\u0000technique may significantly contribute in narrowing the performance gap between\u0000centralized and distributed architectures.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Logarithmic Decomposition and a Signed Measure Space for Entropy","authors":"Keenan J. A. Down, Pedro A. M. Mediano","doi":"arxiv-2409.03732","DOIUrl":"https://doi.org/arxiv-2409.03732","url":null,"abstract":"The Shannon entropy of a random variable X has much behaviour analogous to a\u0000signed measure. Previous work has explored this connection by defining a signed\u0000measure on abstract sets, which are taken to represent the information that\u0000different random variables contain. This construction is sufficient to derive\u0000many measure-theoretical counterparts to information quantities such as the\u0000mutual information $I(X; Y) = mu(tilde{X} cap tilde{Y})$, the joint entropy\u0000$H(X,Y) = mu(tilde{X} cup tilde{Y})$, and the conditional entropy $H(X|Y) =\u0000mu(tilde{X} setminus tilde{Y})$. Here we provide concrete characterisations\u0000of these abstract sets and a corresponding signed measure, and in doing so we\u0000demonstrate that there exists a much finer decomposition with intuitive\u0000properties which we call the logarithmic decomposition (LD). We show that this\u0000signed measure space has the useful property that its logarithmic atoms are\u0000easily characterised with negative or positive entropy, while also being\u0000consistent with Yeung's I-measure. We present the usability of our approach by\u0000re-examining the G'acs-K\"orner common information and the Wyner common\u0000information from this new geometric perspective and characterising it in terms\u0000of our logarithmic atoms - a property we call logarithmic decomposability. We\u0000present possible extensions of this construction to continuous probability\u0000distributions before discussing implications for quality-led information\u0000theory. Lastly, we apply our new decomposition to examine the Dyadic and\u0000Triadic systems of James and Crutchfield and show that, in contrast to the\u0000I-measure alone, our decomposition is able to qualitatively distinguish between\u0000them.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constituent automorphism decoding of Reed-Muller codes","authors":"Yicheng Qu, Amir Tasbihi, Frank R. Kschischang","doi":"arxiv-2409.03700","DOIUrl":"https://doi.org/arxiv-2409.03700","url":null,"abstract":"Automorphism-ensemble decoding is applied to the Plotkin constituents of\u0000Reed-Muller codes, resulting in a new soft-decision decoding algorithm with\u0000state-of-the-art performance versus complexity trade-offs.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on the differential spectrum of the Ness-Helleseth function","authors":"Ketong Ren, Maosheng Xiong, Haode Yan","doi":"arxiv-2409.03189","DOIUrl":"https://doi.org/arxiv-2409.03189","url":null,"abstract":"Let $ngeqslant3$ be an odd integer and $u$ an element in the finite field\u0000$gf_{3^n}$. The Ness-Helleseth function is the binomial\u0000$f_u(x)=ux^{d_1}+x^{d_2}$ over $gf_{3^n}$, where $d_1=frac{3^n-1}{2}-1$ and\u0000$d_2=3^n-2$. In 2007, Ness and Helleseth showed that $f_u$ is an APN function\u0000when $chi(u+1)=chi(u-1)=chi(u)$, is differentially $3$-uniform when\u0000$chi(u+1)=chi(u-1)neqchi(u)$, and has differential uniformity at most 4 if\u0000$ chi(u+1)neqchi(u-1)$ and $unotingf_3$. Here $chi(cdot)$ denotes the\u0000quadratic character on $gf_{3^n}$. Recently, Xia et al. determined the\u0000differential uniformity of $f_u$ for all $u$ and computed the differential\u0000spectrum of $f_u$ for $u$ satisfying $chi(u+1)=chi(u-1)$ or $uingf_3$. The\u0000remaining problem is the differential spectrum of $f_u$ with\u0000$chi(u+1)neqchi(u-1)$ and $unotingf_3$. In this paper, we fill in the gap.\u0000By studying differential equations arising from the Ness-Helleseth function\u0000$f_u$ more carefully, we express the differential spectrum of $f_u$ for such\u0000$u$ in terms of two quadratic character sums. This complements the previous\u0000work of Xia et al.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marco Dalai, Stefano Della Fiore, Adele A. Rescigno, Ugo Vaccaro
{"title":"An Efficient Algorithm for Group Testing with Runlength Constraints","authors":"Marco Dalai, Stefano Della Fiore, Adele A. Rescigno, Ugo Vaccaro","doi":"arxiv-2409.03491","DOIUrl":"https://doi.org/arxiv-2409.03491","url":null,"abstract":"In this paper, we provide an efficient algorithm to construct almost optimal\u0000$(k,n,d)$-superimposed codes with runlength constraints. A\u0000$(k,n,d)$-superimposed code of length $t$ is a $t times n$ binary matrix such\u0000that any two 1's in each column are separated by a run of at least $d$ 0's, and\u0000such that for any column $mathbf{c}$ and any other $k-1$ columns, there exists\u0000a row where $mathbf{c}$ has $1$ and all the remaining $k-1$ columns have $0$.\u0000These combinatorial structures were introduced by Agarwal et al. [1], in the\u0000context of Non-Adaptive Group Testing algorithms with runlength constraints. By using Moser and Tardos' constructive version of the Lov'asz Local Lemma,\u0000we provide an efficient randomized Las Vegas algorithm of complexity $Theta(t\u0000n^2)$ for the construction of $(k,n,d)$-superimposed codes of length\u0000$t=O(dklog n +k^2log n)$. We also show that the length of our codes is\u0000shorter, for $n$ sufficiently large, than that of the codes whose existence was\u0000proved in [1].","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of non-causal systems with arbitrary switching modes","authors":"Yanxin Zhang, Chengpu Yu, Filippo Fabiani","doi":"arxiv-2409.03370","DOIUrl":"https://doi.org/arxiv-2409.03370","url":null,"abstract":"We consider the identification of non-causal systems with arbitrary switching\u0000modes (NCS-ASM), a class of models essential for describing typical power load\u0000management and department store inventory dynamics. The simultaneous\u0000identification of causal-and-anticausal subsystems, along with the presence of\u0000possibly random switching sequences, however, make the overall identification\u0000problem particularly challenging. To this end, we develop an\u0000expectation-maximization (EM) based system identification technique, where the\u0000E-step proposes a modified Kalman filter (KF) to estimate the states and\u0000switching sequences of causal-and-anticausal subsystems, while the M-step\u0000consists in a switching least-squares algorithm to estimate the parameters of\u0000individual subsystems. We establish the main convergence features of the\u0000proposed identification procedure, also providing bounds on the parameter\u0000estimation errors under mild conditions. Finally, the effectiveness of our\u0000identification method is validated through two numerical simulations.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142227858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}