2,770 research outputs found
Noisy Network Coding with Partial DF
In this paper, we propose a noisy network coding integrated with partial
decode-and-forward relaying for single-source multicast discrete memoryless
networks (DMN's). Our coding scheme generalizes the
partial-decode-compress-and-forward scheme (Theorem 7) by Cover and El Gamal.
This is the first time the theorem is generalized for DMN's such that each
relay performs both partial decode-and-forward and compress-and-forward
simultaneously. Our coding scheme simultaneously generalizes both noisy network
coding by Lim, Kim, El Gamal, and Chung and distributed decode-and-forward by
Lim, Kim, and Kim. It is not trivial to combine the two schemes because of
inherent incompatibility in their encoding and decoding strategies. We solve
this problem by sending the same long message over multiple blocks at the
source and at the same time by letting the source find the auxiliary covering
indices that carry information about the message simultaneously over all
blocks.Comment: 5 pages, 1 figure, to appear in Proc. IEEE ISIT 201
On the Achievable Rates of Multihop Virtual Full-Duplex Relay Channels
We study a multihop "virtual" full-duplex relay channel as a special case of
a general multiple multicast relay network. For such channel,
quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the
cut-set upper bound within a constant gap where the gap grows {\em linearly}
with the number of relay stages . However, this gap may not be negligible
for the systems with multihop transmissions (i.e., a wireless backhaul
operating at higher frequencies). We have recently attained an improved result
to the capacity scaling where the gap grows {\em logarithmically} as ,
by using an optimal quantization at relays and by exploiting relays' messages
(decoded in the previous time slot) as side-information. In this paper, we
further improve the performance of this network by presenting a mixed scheme
where each relay can perform either decode-and-forward (DF) or QMF with
possibly rate-splitting. We derive the achievable rate and show that the
proposed scheme outperforms the QMF-optimized scheme. Furthermore, we
demonstrate that this performance improvement increases with .Comment: To be presented at ISIT 201
A Unified Approach for Network Information Theory
In this paper, we take a unified approach for network information theory and
prove a coding theorem, which can recover most of the achievability results in
network information theory that are based on random coding. The final
single-letter expression has a very simple form, which was made possible by
many novel elements such as a unified framework that represents various network
problems in a simple and unified way, a unified coding strategy that consists
of a few basic ingredients but can emulate many known coding techniques if
needed, and new proof techniques beyond the use of standard covering and
packing lemmas. For example, in our framework, sources, channels, states and
side information are treated in a unified way and various constraints such as
cost and distortion constraints are unified as a single joint-typicality
constraint.
Our theorem can be useful in proving many new achievability results easily
and in some cases gives simpler rate expressions than those obtained using
conventional approaches. Furthermore, our unified coding can strictly
outperform existing schemes. For example, we obtain a generalized
decode-compress-amplify-and-forward bound as a simple corollary of our main
theorem and show it strictly outperforms previously known coding schemes. Using
our unified framework, we formally define and characterize three types of
network duality based on channel input-output reversal and network flow
reversal combined with packing-covering duality.Comment: 52 pages, 7 figures, submitted to IEEE Transactions on Information
theory, a shorter version will appear in Proc. IEEE ISIT 201
Continuously non-malleable codes with split-state refresh
Non-malleable codes for the split-state model allow to encode a message into two parts, such that arbitrary independent tampering on each part, and subsequent decoding of the corresponding modified codeword, yields either the same as the original message, or a completely unrelated value. Continuously non-malleable codes further allow to tolerate an unbounded (polynomial) number of tampering attempts, until a decoding error happens. The drawback is that, after an error happens, the system must self-destruct and stop working, otherwise generic attacks become possible. In this paper we propose a solution to this limitation, by leveraging a split-state refreshing procedure. Namely, whenever a decoding error happens, the two parts of an encoding can be locally refreshed (i.e., without any interaction), which allows to avoid the self-destruct mechanism. An additional feature of our security model is that it captures directly security against continual leakage attacks. We give an abstract framework for building such codes in the common reference string model, and provide a concrete instantiation based on the external Diffie-Hellman assumption. Finally, we explore applications in which our notion turns out to be essential. The first application is a signature scheme tolerating an arbitrary polynomial number of split-state tampering attempts, without requiring a self-destruct capability, and in a model where refreshing of the memory happens only after an invalid output is produced. This circumvents an impossibility result from a recent work by Fuijisaki and Xagawa (Asiacrypt 2016). The second application is a compiler for tamper-resilient RAM programs. In comparison to other tamper-resilient compilers, ours has several advantages, among which the fact that, for the first time, it does not rely on the self-destruct feature
Capacity Bounds for a Class of Interference Relay Channels
The capacity of a class of Interference Relay Channels (IRC) -the Injective
Semideterministic IRC where the relay can only observe one of the sources- is
investigated. We first derive a novel outer bound and two inner bounds which
are based on a careful use of each of the available cooperative strategies
together with the adequate interference decoding technique. The outer bound
extends Telatar and Tse's work while the inner bounds contain several known
results in the literature as special cases. Our main result is the
characterization of the capacity region of the Gaussian class of IRCs studied
within a fixed number of bits per dimension -constant gap. The proof relies on
the use of the different cooperative strategies in specific SNR regimes due to
the complexity of the schemes. As a matter of fact, this issue reveals the
complex nature of the Gaussian IRC where the combination of a single coding
scheme for the Gaussian relay and interference channel may not lead to a good
coding scheme for this problem, even when the focus is only on capacity to
within a constant gap over all possible fading statistics.Comment: 23 pages, 6 figures. Submitted to IEEE Transactions on Information
Theory (revised version
- …