42 research outputs found
Capacity Region of the Broadcast Channel with Two Deterministic Channel State Components
This paper establishes the capacity region of a class of broadcast channels
with random state in which each channel component is selected from two possible
functions and each receiver knows its state sequence. This channel model does
not fit into any class of broadcast channels for which the capacity region was
previously known and is useful in studying wireless communication channels when
the fading state is known only at the receivers. The capacity region is shown
to coincide with the UV outer bound and is achieved via Marton coding.Comment: 5 pages, 3 figures. Submitted to ISIT 201
A Quantum Multiparty Packing Lemma and the Relay Channel
Optimally encoding classical information in a quantum system is one of the
oldest and most fundamental challenges of quantum information theory. Holevo's
bound places a hard upper limit on such encodings, while the
Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many
classical messages can be "packed" into a given quantum system. In this
article, we use Sen's recent quantum joint typicality results to prove a
one-shot multiparty quantum packing lemma generalizing the HSW theorem. The
lemma is designed to be easily applicable in many network communication
scenarios. As an illustration, we use it to straightforwardly obtain quantum
generalizations of well-known classical coding schemes for the relay channel:
multihop, coherent multihop, decode-forward, and partial decode-forward. We
provide both finite blocklength and asymptotic results, the latter matching
existing classical formulas. Given the key role of the classical packing lemma
in network information theory, our packing lemma should help open the field to
direct quantum generalization.Comment: 20 page
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent
point-to-point channels with non-causal encoder channel state information
(referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of
stealth-wiretap codes is shown to induce a good sequence of codes for a
corresponding GPC. Consequently, the framework enables exploiting existing
results for GPCs to produce converse proofs for their wiretap analogs. The
analogy readily extends to multiuser broadcasting scenarios, encompassing
broadcast channels (BCs) with deterministic components, degradation ordering
between users, and BCs with cooperative receivers. Given a wiretap BC (WTBC)
with two receivers and one eavesdropper, an analogous Gelfand-Pinsker BC (GPBC)
is constructed by converting the eavesdropper's observation sequence into a
state sequence with an appropriate product distribution (induced by the
stealth-wiretap code for the WTBC), and non-causally revealing the states to
the encoder. The transition matrix of the state-dependent GPBC is extracted
from WTBC's transition law, with the eavesdropper's output playing the role of
the channel state. Past capacity results for the semi-deterministic (SD) GPBC
and the physically-degraded (PD) GPBC with an informed receiver are leveraged
to furnish analogy-based converse proofs for the analogous WTBC setups. This
characterizes the secrecy-capacity regions of the SD-WTBC and the PD-WTBC, in
which the stronger receiver also observes the eavesdropper's channel output.
These derivations exemplify how the wiretap-GP analogy enables translating
results on one problem into advances in the study of the other