65,253 research outputs found
Modes of Information Flow
Information flow between components of a system takes many forms and is key
to understanding the organization and functioning of large-scale, complex
systems. We demonstrate three modalities of information flow from time series X
to time series Y. Intrinsic information flow exists when the past of X is
individually predictive of the present of Y, independent of Y's past; this is
most commonly considered information flow. Shared information flow exists when
X's past is predictive of Y's present in the same manner as Y's past; this
occurs due to synchronization or common driving, for example. Finally,
synergistic information flow occurs when neither X's nor Y's pasts are
predictive of Y's present on their own, but taken together they are. The two
most broadly-employed information-theoretic methods of quantifying information
flow---time-delayed mutual information and transfer entropy---are both
sensitive to a pair of these modalities: time-delayed mutual information to
both intrinsic and shared flow, and transfer entropy to both intrinsic and
synergistic flow. To quantify each mode individually we introduce our
cryptographic flow ansatz, positing that intrinsic flow is synonymous with
secret key agreement between X and Y. Based on this, we employ an
easily-computed secret-key-agreement bound---intrinsic mutual
information&mdashto quantify the three flow modalities in a variety of systems
including asymmetric flows and financial markets.Comment: 11 pages; 10 figures;
http://csc.ucdavis.edu/~cmg/compmech/pubs/ite.ht
Compressed Secret Key Agreement: Maximizing Multivariate Mutual Information Per Bit
The multiterminal secret key agreement problem by public discussion is
formulated with an additional source compression step where, prior to the
public discussion phase, users independently compress their private sources to
filter out strongly correlated components for generating a common secret key.
The objective is to maximize the achievable key rate as a function of the joint
entropy of the compressed sources. Since the maximum achievable key rate
captures the total amount of information mutual to the compressed sources, an
optimal compression scheme essentially maximizes the multivariate mutual
information per bit of randomness of the private sources, and can therefore be
viewed more generally as a dimension reduction technique. Single-letter lower
and upper bounds on the maximum achievable key rate are derived for the general
source model, and an explicit polynomial-time computable formula is obtained
for the pairwise independent network model. In particular, the converse results
and the upper bounds are obtained from those of the related secret key
agreement problem with rate-limited discussion. A precise duality is shown for
the two-user case with one-way discussion, and such duality is extended to
obtain the desired converse results in the multi-user case. In addition to
posing new challenges in information processing and dimension reduction, the
compressed secret key agreement problem helps shed new light on resolving the
difficult problem of secret key agreement with rate-limited discussion, by
offering a more structured achieving scheme and some simpler conjectures to
prove
Secret Key Agreement under Discussion Rate Constraints
For the multiterminal secret key agreement problem, new single-letter lower
bounds are obtained on the public discussion rate required to achieve any given
secret key rate below the secrecy capacity. The results apply to general source
model without helpers or wiretapper's side information but can be strengthened
for hypergraphical sources. In particular, for the pairwise independent
network, the results give rise to a complete characterization of the maximum
secret key rate achievable under a constraint on the total discussion rate
On the Optimality of Secret Key Agreement via Omniscience
For the multiterminal secret key agreement problem under a private source
model, it is known that the maximum key rate, i.e., the secrecy capacity, can
be achieved through communication for omniscience, but the omniscience strategy
can be strictly suboptimal in terms of minimizing the public discussion rate.
While a single-letter characterization is not known for the minimum discussion
rate needed for achieving the secrecy capacity, we derive single-letter lower
and upper bounds that yield some simple conditions for omniscience to be
discussion-rate optimal. These conditions turn out to be enough to deduce the
optimality of omniscience for a large class of sources including the
hypergraphical sources. Through conjectures and examples, we explore other
source models to which our methods do not easily extend
Hybrid quantum key distribution using coherent states and photon-number-resolving detectors
We put forward a hybrid quantum key distribution protocol based on coherent
states, Gaussian modulation, and photon-number-resolving (PNR) detectors, and
show that it may enhance the secret key generation rate (KGR) compared to
homodyne-based schemes. Improvement in the KGR may be traced back to the
dependence of the two-dimensional discrete output variable on both the input
quadratures, thus overcoming the limitations of the original protocol. When
reverse reconciliation is considered, the scheme based on PNR detectors
outperforms the homodyne one both for individual and collective attacks. In the
presence of direct reconciliation, the PNR strategy is still the best one
against individual attacks, but for the collective ones the homodyne-based
scheme is still to be preferred as the channel transmissivity decreases.Comment: 5 pages, 5 figures. We extended our analysis to reverse
reconciliation and to collective attack
- …