1,673 research outputs found
Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point
The problem of multilevel diversity coding with secure regeneration (MDC-SR)
is considered, which includes the problems of multilevel diversity coding with
regeneration (MDC-R) and secure regenerating code (SRC) as special cases. Two
outer bounds are established, showing that separate coding of different
messages using the respective SRCs can achieve the
minimum-bandwidth-regeneration (MBR) point of the achievable normalized
storage-capacity repair-bandwidth tradeoff regions for the general MDC-SR
problem. The core of the new converse results is an exchange lemma, which can
be established using Han's subset inequality
Secure Symmetrical Multilevel Diversity Coding
Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC to the secure communication setting with an additional eavesdropper. In a general S-SMDC system, a legitimate receiver and an eavesdropper have access to a subset U and A of the encoder outputs, respectively. Which subsets U and A will materialize are unknown a priori at the encoders. No matter which subsets U and A actually occur, the sources (S1,...,Sk) need to be perfectly reconstructable at the legitimate receiver whenever |U| = N +k, and all sources (S1,...,S_L-N) need to be kept perfectly secure from the eavesdropper as long as |A| <= N. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some properties of basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that superposition coding remains optimal in terms of achieving the minimum sum rate for the general secure SMDC problem
Weakly Secure Symmetric Multilevel Diversity Coding
Multilevel diversity coding is a classical coding model where multiple
mutually independent information messages are encoded, such that different
reliability requirements can be afforded to different messages. It is well
known that {\em superposition coding}, namely separately encoding the
independent messages, is optimal for symmetric multilevel diversity coding
(SMDC) (Yeung-Zhang 1999). In the current paper, we consider weakly secure SMDC
where security constraints are injected on each individual message, and provide
a complete characterization of the conditions under which superposition coding
is sum-rate optimal. Two joint coding strategies, which lead to rate savings
compared to superposition coding, are proposed, where some coding components
for one message can be used as the encryption key for another. By applying
different variants of Han's inequality, we show that the lack of opportunity to
apply these two coding strategies directly implies the optimality of
superposition coding. It is further shown that under a set of particular
security constraints, one of the proposed joint coding strategies can be used
to construct a code that achieves the optimal rate region.Comment: The paper has been accepted by IEEE Transactions on Information
Theor
Information-Theoretically Secure Communication Under Channel Uncertainty
Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a
fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty.
First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel
uncertainty for decoding the common message at the receivers) and a confidential message intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other is considered. A matrix characterization of the secrecy capacity region is established via a channel-enhancement argument and an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel.
Second, a multilevel security wiretap channel where there is one possible realization for the legitimate receiver channel but multiple possible realizations for the eavesdropper channel (i.e., channel uncertainty at the eavesdropper) is considered. A coding scheme is designed such that the number of secure bits delivered to the legitimate receiver depends on the actual realization of the eavesdropper channel. More specifically, when the eavesdropper channel realization is weak, all bits delivered to the legitimate receiver need to be secure. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We show that the key to achieving efficient security embedding is to jointly encode the low-security and high-security bits. In particular, the low-security bits can be used as (part of) the transmitter randomness to protect the high-security ones.
Finally, motivated by the recent interest in building secure, robust and efficient distributed information storage systems, the problem of secure symmetrical multilevel diversity coding (S-SMDC) is considered. This is a setting where there are channel uncertainties at both the legitimate receiver and the eavesdropper. The problem of encoding individual sources is first studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that the simple coding strategy of separately encoding individual sources at the encoders can achieve the minimum sum rate for the general S-SMDC problem
Symmetrical Multilevel Diversity Coding and Subset Entropy Inequalities
Symmetrical multilevel diversity coding (SMDC) is a classical model for
coding over distributed storage. In this setting, a simple separate encoding
strategy known as superposition coding was shown to be optimal in terms of
achieving the minimum sum rate (Roche, Yeung, and Hau, 1997) and the entire
admissible rate region (Yeung and Zhang, 1999) of the problem. The proofs
utilized carefully constructed induction arguments, for which the classical
subset entropy inequality of Han (1978) played a key role. This paper includes
two parts. In the first part the existing optimality proofs for classical SMDC
are revisited, with a focus on their connections to subset entropy
inequalities. First, a new sliding-window subset entropy inequality is
introduced and then used to establish the optimality of superposition coding
for achieving the minimum sum rate under a weaker source-reconstruction
requirement. Second, a subset entropy inequality recently proved by Madiman and
Tetali (2010) is used to develop a new structural understanding to the proof of
Yeung and Zhang on the optimality of superposition coding for achieving the
entire admissible rate region. Building on the connections between classical
SMDC and the subset entropy inequalities developed in the first part, in the
second part the optimality of superposition coding is further extended to the
cases where there is either an additional all-access encoder (SMDC-A) or an
additional secrecy constraint (S-SMDC).Comment: 44 pages, 5 figures. Major revision in November 2012. Revised draft
submitted to the IEEE Transactions on Information Theor
The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding
It is well known that {\em superposition coding}, namely separately encoding
the independent sources, is optimal for symmetric multilevel diversity coding
(SMDC) (Yeung-Zhang 1999). However, the characterization of the coding rate
region therein involves uncountably many linear inequalities and the constant
term (i.e., the lower bound) in each inequality is given in terms of the
solution of a linear optimization problem. Thus this implicit characterization
of the coding rate region does not enable the determination of the
achievability of a given rate tuple. In this paper, we first obtain closed-form
expressions of these uncountably many inequalities. Then we identify a finite
subset of inequalities that is sufficient for characterizing the coding rate
region. This gives an explicit characterization of the coding rate region. We
further show by the symmetry of the problem that only a much smaller subset of
this finite set of inequalities needs to be verified in determining the
achievability of a given rate tuple. Yet, the cardinality of this smaller set
grows at least exponentially fast with . We also present a subset entropy
inequality, which together with our explicit characterization of the coding
rate region, is sufficient for proving the optimality of superposition coding
Fundamental Limits of Exact-Repair Regenerating Codes
Understanding the fundamental limits of communication systems involves both constructing efficient coding schemes as well as proving mathematically that certain performance is impossible to achieve; the latter is known as the converse problem in information theory. This thesis focused on the converse problems for complex information systems such as self-repair distributed storage and coded caching systems, and our goal was to establish tight converse results for such systems by exploiting problem-specific combinatorial structures.
The main part of this thesis dealt with exact-repair regenerating codes, which were first proposed by Dimakis et al. in 2010. In particular, we considered two extensions of the original setting of Dimakis et al., namely 1) multilevel diversity coding with regeneration and 2) secure exact-repair regenerating codes. For the problem of multilevel diversity coding with regeneration, we showed, via the proposed combinatorial approach, that the natural separate encoding strategy can achieve the optimal tradeoff between the normalized storage capacity and repair bandwidth at the minimum-bandwidth rate (MBR) point. This settled a conjecture by Tian and Liu in 2015.
For the problem of secure exact-repair regenerating codes, all known results from the literature showed that the achievable tradeoff regions between the normalized storage capacity and repair bandwidth have a single corner point, achieved by a scheme proposed by Shah, Rashmi and Kumar (the SRK point). Since the achievable tradeoff regions of the exact-repair regenerating code problem without any secrecy constraints were known to have multiple corner points in general, these existing results suggested a phase-change-like behavior, i.e., enforcing a secrecy constraint immediately reduces the tradeoff region to one with a single corner point. In our work, we first showed that when the secrecy parameter is sufficiently large, the SRK point is indeed the only corner point of the tradeoff region. However, when the secrecy parameter is small, we showed that the tradeoff region can, in fact, have multiple corner points. In particular, we established a precise characterization of the tradeoff region for a particular problem instance, which has exactly two corner points. Thus, a smooth transition, instead of a phase-change-type of transition, should be expected as the secrecy constraint is gradually strengthened
Symmetrical Multilevel Diversity Coding and Subset Entropy Inequalities
Symmetrical multilevel diversity coding (SMDC) is a classical model for coding over distributed storage. In this setting, a simple separate encoding strategy known as superposition coding was shown to be optimal in terms of achieving the minimum sum rate and the entire admissible rate region of the problem in the literature. The proofs utilized carefully constructed induction arguments, for which the classical subset entropy inequality of Han played a key role.
This thesis includes two parts. In the first part the existing optimality proofs for classical SMDC are revisited, with a focus on their connections to subset entropy inequalities. First, a new sliding-window subset entropy inequality is introduced and then used to establish the optimality of superposition coding for achieving the minimum sum rate under a weaker source-reconstruction requirement. Second, a subset entropy inequality recently proved by Madiman and Tetali is used to develop a new structural understanding to the proof of Yeung and Zhang on the optimality of superposition coding for achieving the entire admissible rate region. Building on the connections between classical SMDC and the subset entropy inequalities developed in the first part, in the second part the optimality of superposition coding is further extended to the cases where there is an additional all-access encoder, an additional secrecy constraint or an encoder hierarchy
- …