21 research outputs found
The Degraded Gaussian Diamond-Wiretap Channel
In this paper, we present nontrivial upper and lower bounds on the secrecy
capacity of the degraded Gaussian diamond-wiretap channel and identify several
ranges of channel parameters where these bounds coincide with useful
intuitions. Furthermore, we investigate the effect of the presence of an
eavesdropper on the capacity. We consider the following two scenarios regarding
the availability of randomness: 1) a common randomness is available at the
source and the two relays and 2) a randomness is available only at the source
and there is no available randomness at the relays. We obtain the upper bound
by taking into account the correlation between the two relay signals and the
availability of randomness at each encoder. For the lower bound, we propose two
types of coding schemes: 1) a decode-and-forward scheme where the relays
cooperatively transmit the message and the fictitious message and 2) a partial
DF scheme incorporated with multicoding in which each relay sends an
independent partial message and the whole or partial fictitious message using
dependent codewords.Comment: 26 pages, 6 figures, a short version will appear in Proc. IEEE ISIT
201
A Unified Approach for Network Information Theory
In this paper, we take a unified approach for network information theory and
prove a coding theorem, which can recover most of the achievability results in
network information theory that are based on random coding. The final
single-letter expression has a very simple form, which was made possible by
many novel elements such as a unified framework that represents various network
problems in a simple and unified way, a unified coding strategy that consists
of a few basic ingredients but can emulate many known coding techniques if
needed, and new proof techniques beyond the use of standard covering and
packing lemmas. For example, in our framework, sources, channels, states and
side information are treated in a unified way and various constraints such as
cost and distortion constraints are unified as a single joint-typicality
constraint.
Our theorem can be useful in proving many new achievability results easily
and in some cases gives simpler rate expressions than those obtained using
conventional approaches. Furthermore, our unified coding can strictly
outperform existing schemes. For example, we obtain a generalized
decode-compress-amplify-and-forward bound as a simple corollary of our main
theorem and show it strictly outperforms previously known coding schemes. Using
our unified framework, we formally define and characterize three types of
network duality based on channel input-output reversal and network flow
reversal combined with packing-covering duality.Comment: 52 pages, 7 figures, submitted to IEEE Transactions on Information
theory, a shorter version will appear in Proc. IEEE ISIT 201
Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes
We propose efficient coding schemes for two communication settings: 1.
asymmetric channels, and 2. channels with an informed encoder. These settings
are important in non-volatile memories, as well as optical and broadcast
communication. The schemes are based on non-linear polar codes, and they build
on and improve recent work on these settings. In asymmetric channels, we tackle
the exponential storage requirement of previously known schemes, that resulted
from the use of large Boolean functions. We propose an improved scheme, that
achieves the capacity of asymmetric channels with polynomial computational
complexity and storage requirement.
The proposed non-linear scheme is then generalized to the setting of channel
coding with an informed encoder, using a multicoding technique. We consider
specific instances of the scheme for flash memories, that incorporate
error-correction capabilities together with rewriting. Since the considered
codes are non-linear, they eliminate the requirement of previously known
schemes (called polar write-once-memory codes) for shared randomness between
the encoder and the decoder. Finally, we mention that the multicoding scheme is
also useful for broadcast communication in Marton's region, improving upon
previous schemes for this setting.Comment: Submitted to IEEE Transactions on Information Theory. Partially
presented at ISIT 201
An improved rate region for the classical-quantum broadcast channel
We present a new achievable rate region for the two-user binary-input
classical-quantum broadcast channel. The result is a generalization of the
classical Marton-Gelfand-Pinsker region and is provably larger than the best
previously known rate region for classical-quantum broadcast channels. The
proof of achievability is based on the recently introduced polar coding scheme
and its generalization to quantum network information theory.Comment: 5 pages, double column, 1 figure, based on a result presented in the
Master's thesis arXiv:1501.0373