317,137 research outputs found
Securing a Quantum Key Distribution Network Using Secret Sharing
We present a simple new technique to secure quantum key distribution relay
networks using secret sharing. Previous techniques have relied on creating
distinct physical paths in order to create the shares. We show, however, how
this can be achieved on a single physical path by creating distinct logical
channels. The technique utilizes a random 'drop-out' scheme to ensure that an
attacker must compromise all of the relays on the channel in order to access
the key
The Dispersion of Nearest-Neighbor Decoding for Additive Non-Gaussian Channels
We study the second-order asymptotics of information transmission using
random Gaussian codebooks and nearest neighbor (NN) decoding over a
power-limited stationary memoryless additive non-Gaussian noise channel. We
show that the dispersion term depends on the non-Gaussian noise only through
its second and fourth moments, thus complementing the capacity result
(Lapidoth, 1996), which depends only on the second moment. Furthermore, we
characterize the second-order asymptotics of point-to-point codes over
-sender interference networks with non-Gaussian additive noise.
Specifically, we assume that each user's codebook is Gaussian and that NN
decoding is employed, i.e., that interference from the unintended users
(Gaussian interfering signals) is treated as noise at each decoder. We show
that while the first-order term in the asymptotic expansion of the maximum
number of messages depends on the power of the interferring codewords only
through their sum, this does not hold for the second-order term.Comment: 12 pages, 3 figures, IEEE Transactions on Information Theor
Optimal Save-Then-Transmit Protocol for Energy Harvesting Wireless Transmitters
In this paper, the design of a wireless communication device relying
exclusively on energy harvesting is considered. Due to the inability of
rechargeable energy sources to charge and discharge at the same time, a
constraint we term the energy half-duplex constraint, two rechargeable energy
storage devices (ESDs) are assumed so that at any given time, there is always
one ESD being recharged. The energy harvesting rate is assumed to be a random
variable that is constant over the time interval of interest. A
save-then-transmit (ST) protocol is introduced, in which a fraction of time
{\rho} (dubbed the save-ratio) is devoted exclusively to energy harvesting,
with the remaining fraction 1 - {\rho} used for data transmission. The ratio of
the energy obtainable from an ESD to the energy harvested is termed the energy
storage efficiency, {\eta}. We address the practical case of the secondary ESD
being a battery with {\eta} < 1, and the main ESD being a super-capacitor with
{\eta} = 1. The optimal save-ratio that minimizes outage probability is
derived, from which some useful design guidelines are drawn. In addition, we
compare the outage performance of random power supply to that of constant power
supply over the Rayleigh fading channel. The diversity order with random power
is shown to be the same as that of constant power, but the performance gap can
be large. Furthermore, we extend the proposed ST protocol to wireless networks
with multiple transmitters. It is shown that the system-level outage
performance is critically dependent on the relationship between the number of
transmitters and the optimal save-ratio for single-channel outage minimization.
Numerical results are provided to validate our proposed study.Comment: This is the longer version of a paper to appear in IEEE Transactions
on Wireless Communication
- …