arXiv - MATH - Information Theory最新文献

筛选
英文 中文
A Generalization of Axiomatic Approach to Information Leakage 信息泄漏公理法的一般化
arXiv - MATH - Information Theory Pub Date : 2024-09-06 DOI: arxiv-2409.04108
Mohammad Amin Zarrabian, Parastoo Sadeghi
{"title":"A Generalization of Axiomatic Approach to Information Leakage","authors":"Mohammad Amin Zarrabian, Parastoo Sadeghi","doi":"arxiv-2409.04108","DOIUrl":"https://doi.org/arxiv-2409.04108","url":null,"abstract":"In this paper, we extend the framework of quantitative information flow (QIF)\u0000to include adversaries that use Kolmogorov-Nagumo $f$-mean to infer secrets of\u0000a private system. Specifically, in our setting, an adversary uses\u0000Kolmogorov-Nagumo $f$-mean to compute its best actions before and after\u0000observing the system's randomized outputs. This leads to generalized notions of\u0000prior and posterior vulnerability and generalized axiomatic relations that we\u0000will derive to elucidate how these $f$-mean based vulnerabilities interact with\u0000each other. We demonstrate usefulness of this framework by showing how some\u0000notions of leakage that had been derived outside of the QIF framework and so\u0000far seemed incompatible with it are indeed explainable via such extension of\u0000QIF. These leakage measures include $alpha$-leakage, which is the same as\u0000Arimoto mutual information of order $alpha$, maximal $alpha$-leakage which is\u0000the $alpha$-leakage capacity, and $(alpha,beta)$ leakage, which is a\u0000generalization of the above and captures local differential privacy as a\u0000special case. We also propose a new pointwise notion of gain function, which we\u0000coin pointwise information gain. We show that this pointwise information gain\u0000can explain R'eyni divergence and Sibson mutual information of order $alpha\u0000in [0,infty]$ as the Kolmogorov-Nagumo average of the gain with a proper\u0000choice of function $f$.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Locally recoverable algebro-geometric codes with multiple recovery sets from projective bundles 从投影束出发的具有多个恢复集的局部可恢复阿尔基几何码
arXiv - MATH - Information Theory Pub Date : 2024-09-06 DOI: arxiv-2409.04201
Konrad Aguilar, Angelynn Álvarez, René Ardila, Pablo S. Ocal, Cristian Rodriguez Avila, Anthony Várilly-Alvarado
{"title":"Locally recoverable algebro-geometric codes with multiple recovery sets from projective bundles","authors":"Konrad Aguilar, Angelynn Álvarez, René Ardila, Pablo S. Ocal, Cristian Rodriguez Avila, Anthony Várilly-Alvarado","doi":"arxiv-2409.04201","DOIUrl":"https://doi.org/arxiv-2409.04201","url":null,"abstract":"A code is locally recoverable when each symbol in one of its code words can\u0000be reconstructed as a function of $r$ other symbols. We use bundles of\u0000projective spaces over a line to construct locally recoverable codes with\u0000availability; that is, evaluation codes where each code word symbol can be\u0000reconstructed from several disjoint sets of other symbols. The simplest case,\u0000where the code's underlying variety is a plane, exhibits noteworthy properties:\u0000When $r = 1$, $2$, $3$, they are optimal; when $r geq 4$, they are optimal\u0000with probability approaching $1$ as the alphabet size grows. Additionally,\u0000their information rate is close to the theoretical limit. In higher dimensions,\u0000our codes form a family of asymptotically good codes.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-latency Secure Integrated Sensing and Communication with Transmitter Actions 低延迟安全集成传感和通信与发射机行动
arXiv - MATH - Information Theory Pub Date : 2024-09-06 DOI: arxiv-2409.04619
Truman Welling, Onur Günlü, Aylin Yener
{"title":"Low-latency Secure Integrated Sensing and Communication with Transmitter Actions","authors":"Truman Welling, Onur Günlü, Aylin Yener","doi":"arxiv-2409.04619","DOIUrl":"https://doi.org/arxiv-2409.04619","url":null,"abstract":"This paper considers an information theoretic model of secure integrated\u0000sensing and communication, represented as a wiretap channel with action\u0000dependent states. This model allows securing part of a transmitted message\u0000against a sensed target that eavesdrops the communication, while enabling\u0000transmitter actions to change the channel statistics. An exact\u0000secrecy-distortion region is given for a physically-degraded channel. A\u0000finite-length achievability region is established for the model using an output\u0000statistics of random binning method, giving an achievable bound for low-latency\u0000applications.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication-Assisted Sensing Systems: Fundamental Limits and ISAC Waveform Design 通信辅助传感系统:基本限制和 ISAC 波形设计
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03561
Fuwang Dong, Fan Liu, Yifeng Xiong, Yuanhao Cui, Wei Wang, Shi Jin
{"title":"Communication-Assisted Sensing Systems: Fundamental Limits and ISAC Waveform Design","authors":"Fuwang Dong, Fan Liu, Yifeng Xiong, Yuanhao Cui, Wei Wang, Shi Jin","doi":"arxiv-2409.03561","DOIUrl":"https://doi.org/arxiv-2409.03561","url":null,"abstract":"The communication-assisted sensing (CAS) systems are expected to endow the\u0000users with beyond-line-of-sight sensing capabilities without the aid of\u0000additional sensors. In this paper, we study the dual-functional signaling\u0000strategy, focusing on three primary aspects, namely, the information-theoretic\u0000framework, the optimal distribution of channel input, and the optimal waveform\u0000design for Gaussian signals. First, we establish the information-theoretic\u0000framework and develop a modified source-channel separation theorem (MSST)\u0000tailored for CAS systems. The proposed MSST elucidates the relationship between\u0000achievable distortion, coding rate, and communication channel capacity in cases\u0000where the distortion metric is separable for sensing and communication (S&C)\u0000processes. Second, we present an optimal channel input design for\u0000dual-functional signaling, which aims to minimize total distortion under the\u0000constraints of the MSST and resource budget. We then conceive a two-step\u0000Blahut-Arimoto (BA)-based optimal search algorithm to numerically solve the\u0000functional optimization problem. Third, in light of the current signaling\u0000strategy, we further propose an optimal waveform design for Gaussian signaling\u0000in multi-input multi-output (MIMO) CAS systems. The associated covariance\u0000matrix optimization problem is addressed using a successive convex\u0000approximation (SCA)-based waveform design algorithm. Finally, we provide\u0000numerical simulation results to demonstrate the effectiveness of the proposed\u0000algorithms and to show the unique performance tradeoff between S&C processes.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"161 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Optimal Performance of Distributed Cell-Free Massive MIMO with LoS Propagation 论具有 LoS 传播的分布式无小区大规模多输入多输出(MIMO)的最佳性能
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03551
Noor Ul Ain, Lorenzo Miretti, Sławomir Stańczak
{"title":"On the Optimal Performance of Distributed Cell-Free Massive MIMO with LoS Propagation","authors":"Noor Ul Ain, Lorenzo Miretti, Sławomir Stańczak","doi":"arxiv-2409.03551","DOIUrl":"https://doi.org/arxiv-2409.03551","url":null,"abstract":"In this study, we revisit the performance analysis of distributed beamforming\u0000architectures in dense user-centric cell-free massive multiple-input\u0000multiple-output (mMIMO) systems in line-of-sight (LoS) scenarios. By\u0000incorporating a recently developed optimal distributed beamforming technique,\u0000called the team minimum mean square error (TMMSE) technique, we depart from\u0000previous studies that rely on suboptimal distributed beamforming approaches for\u0000LoS scenarios. Supported by extensive numerical simulations that follow 3GPP\u0000guidelines, we show that such suboptimal approaches may often lead to\u0000significant underestimation of the capabilities of distributed architectures,\u0000particularly in the presence of strong LoS paths. Considering the anticipated\u0000ultra-dense nature of cell-free mMIMO networks and the consequential high\u0000likelihood of strong LoS paths, our findings reveal that the team MMSE\u0000technique may significantly contribute in narrowing the performance gap between\u0000centralized and distributed architectures.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Logarithmic Decomposition and a Signed Measure Space for Entropy 熵的对数分解和有符号度量空间
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03732
Keenan J. A. Down, Pedro A. M. Mediano
{"title":"A Logarithmic Decomposition and a Signed Measure Space for Entropy","authors":"Keenan J. A. Down, Pedro A. M. Mediano","doi":"arxiv-2409.03732","DOIUrl":"https://doi.org/arxiv-2409.03732","url":null,"abstract":"The Shannon entropy of a random variable X has much behaviour analogous to a\u0000signed measure. Previous work has explored this connection by defining a signed\u0000measure on abstract sets, which are taken to represent the information that\u0000different random variables contain. This construction is sufficient to derive\u0000many measure-theoretical counterparts to information quantities such as the\u0000mutual information $I(X; Y) = mu(tilde{X} cap tilde{Y})$, the joint entropy\u0000$H(X,Y) = mu(tilde{X} cup tilde{Y})$, and the conditional entropy $H(X|Y) =\u0000mu(tilde{X} setminus tilde{Y})$. Here we provide concrete characterisations\u0000of these abstract sets and a corresponding signed measure, and in doing so we\u0000demonstrate that there exists a much finer decomposition with intuitive\u0000properties which we call the logarithmic decomposition (LD). We show that this\u0000signed measure space has the useful property that its logarithmic atoms are\u0000easily characterised with negative or positive entropy, while also being\u0000consistent with Yeung's I-measure. We present the usability of our approach by\u0000re-examining the G'acs-K\"orner common information and the Wyner common\u0000information from this new geometric perspective and characterising it in terms\u0000of our logarithmic atoms - a property we call logarithmic decomposability. We\u0000present possible extensions of this construction to continuous probability\u0000distributions before discussing implications for quality-led information\u0000theory. Lastly, we apply our new decomposition to examine the Dyadic and\u0000Triadic systems of James and Crutchfield and show that, in contrast to the\u0000I-measure alone, our decomposition is able to qualitatively distinguish between\u0000them.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constituent automorphism decoding of Reed-Muller codes 里德-穆勒码的构元自动形态解码
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03700
Yicheng Qu, Amir Tasbihi, Frank R. Kschischang
{"title":"Constituent automorphism decoding of Reed-Muller codes","authors":"Yicheng Qu, Amir Tasbihi, Frank R. Kschischang","doi":"arxiv-2409.03700","DOIUrl":"https://doi.org/arxiv-2409.03700","url":null,"abstract":"Automorphism-ensemble decoding is applied to the Plotkin constituents of\u0000Reed-Muller codes, resulting in a new soft-decision decoding algorithm with\u0000state-of-the-art performance versus complexity trade-offs.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on the differential spectrum of the Ness-Helleseth function 关于奈斯-赫勒塞斯函数微分谱的说明
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03189
Ketong Ren, Maosheng Xiong, Haode Yan
{"title":"A note on the differential spectrum of the Ness-Helleseth function","authors":"Ketong Ren, Maosheng Xiong, Haode Yan","doi":"arxiv-2409.03189","DOIUrl":"https://doi.org/arxiv-2409.03189","url":null,"abstract":"Let $ngeqslant3$ be an odd integer and $u$ an element in the finite field\u0000$gf_{3^n}$. The Ness-Helleseth function is the binomial\u0000$f_u(x)=ux^{d_1}+x^{d_2}$ over $gf_{3^n}$, where $d_1=frac{3^n-1}{2}-1$ and\u0000$d_2=3^n-2$. In 2007, Ness and Helleseth showed that $f_u$ is an APN function\u0000when $chi(u+1)=chi(u-1)=chi(u)$, is differentially $3$-uniform when\u0000$chi(u+1)=chi(u-1)neqchi(u)$, and has differential uniformity at most 4 if\u0000$ chi(u+1)neqchi(u-1)$ and $unotingf_3$. Here $chi(cdot)$ denotes the\u0000quadratic character on $gf_{3^n}$. Recently, Xia et al. determined the\u0000differential uniformity of $f_u$ for all $u$ and computed the differential\u0000spectrum of $f_u$ for $u$ satisfying $chi(u+1)=chi(u-1)$ or $uingf_3$. The\u0000remaining problem is the differential spectrum of $f_u$ with\u0000$chi(u+1)neqchi(u-1)$ and $unotingf_3$. In this paper, we fill in the gap.\u0000By studying differential equations arising from the Ness-Helleseth function\u0000$f_u$ more carefully, we express the differential spectrum of $f_u$ for such\u0000$u$ in terms of two quadratic character sums. This complements the previous\u0000work of Xia et al.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Algorithm for Group Testing with Runlength Constraints 具有运行长度限制的分组测试高效算法
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03491
Marco Dalai, Stefano Della Fiore, Adele A. Rescigno, Ugo Vaccaro
{"title":"An Efficient Algorithm for Group Testing with Runlength Constraints","authors":"Marco Dalai, Stefano Della Fiore, Adele A. Rescigno, Ugo Vaccaro","doi":"arxiv-2409.03491","DOIUrl":"https://doi.org/arxiv-2409.03491","url":null,"abstract":"In this paper, we provide an efficient algorithm to construct almost optimal\u0000$(k,n,d)$-superimposed codes with runlength constraints. A\u0000$(k,n,d)$-superimposed code of length $t$ is a $t times n$ binary matrix such\u0000that any two 1's in each column are separated by a run of at least $d$ 0's, and\u0000such that for any column $mathbf{c}$ and any other $k-1$ columns, there exists\u0000a row where $mathbf{c}$ has $1$ and all the remaining $k-1$ columns have $0$.\u0000These combinatorial structures were introduced by Agarwal et al. [1], in the\u0000context of Non-Adaptive Group Testing algorithms with runlength constraints. By using Moser and Tardos' constructive version of the Lov'asz Local Lemma,\u0000we provide an efficient randomized Las Vegas algorithm of complexity $Theta(t\u0000n^2)$ for the construction of $(k,n,d)$-superimposed codes of length\u0000$t=O(dklog n +k^2log n)$. We also show that the length of our codes is\u0000shorter, for $n$ sufficiently large, than that of the codes whose existence was\u0000proved in [1].","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142217245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of non-causal systems with arbitrary switching modes 识别具有任意开关模式的非因果系统
arXiv - MATH - Information Theory Pub Date : 2024-09-05 DOI: arxiv-2409.03370
Yanxin Zhang, Chengpu Yu, Filippo Fabiani
{"title":"Identification of non-causal systems with arbitrary switching modes","authors":"Yanxin Zhang, Chengpu Yu, Filippo Fabiani","doi":"arxiv-2409.03370","DOIUrl":"https://doi.org/arxiv-2409.03370","url":null,"abstract":"We consider the identification of non-causal systems with arbitrary switching\u0000modes (NCS-ASM), a class of models essential for describing typical power load\u0000management and department store inventory dynamics. The simultaneous\u0000identification of causal-and-anticausal subsystems, along with the presence of\u0000possibly random switching sequences, however, make the overall identification\u0000problem particularly challenging. To this end, we develop an\u0000expectation-maximization (EM) based system identification technique, where the\u0000E-step proposes a modified Kalman filter (KF) to estimate the states and\u0000switching sequences of causal-and-anticausal subsystems, while the M-step\u0000consists in a switching least-squares algorithm to estimate the parameters of\u0000individual subsystems. We establish the main convergence features of the\u0000proposed identification procedure, also providing bounds on the parameter\u0000estimation errors under mild conditions. Finally, the effectiveness of our\u0000identification method is validated through two numerical simulations.","PeriodicalId":501082,"journal":{"name":"arXiv - MATH - Information Theory","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142227858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信