99 research outputs found
Empirical and Strong Coordination via Soft Covering with Polar Codes
We design polar codes for empirical coordination and strong coordination in
two-node networks. Our constructions hinge on the fact that polar codes enable
explicit low-complexity schemes for soft covering. We leverage this property to
propose explicit and low-complexity coding schemes that achieve the capacity
regions of both empirical coordination and strong coordination for sequences of
actions taking value in an alphabet of prime cardinality. Our results improve
previously known polar coding schemes, which (i) were restricted to uniform
distributions and to actions obtained via binary symmetric channels for strong
coordination, (ii) required a non-negligible amount of common randomness for
empirical coordination, and (iii) assumed that the simulation of discrete
memoryless channels could be perfectly implemented. As a by-product of our
results, we obtain a polar coding scheme that achieves channel resolvability
for an arbitrary discrete memoryless channel whose input alphabet has prime
cardinality.Comment: 14 pages, two-column, 5 figures, accepted to IEEE Transactions on
Information Theor
Distributed Channel Synthesis
Two familiar notions of correlation are rediscovered as the extreme operating
points for distributed synthesis of a discrete memoryless channel, in which a
stochastic channel output is generated based on a compressed description of the
channel input. Wyner's common information is the minimum description rate
needed. However, when common randomness independent of the input is available,
the necessary description rate reduces to Shannon's mutual information. This
work characterizes the optimal trade-off between the amount of common
randomness used and the required rate of description. We also include a number
of related derivations, including the effect of limited local randomness, rate
requirements for secrecy, applications to game theory, and new insights into
common information duality.
Our proof makes use of a soft covering lemma, known in the literature for its
role in quantifying the resolvability of a channel. The direct proof
(achievability) constructs a feasible joint distribution over all parts of the
system using a soft covering, from which the behavior of the encoder and
decoder is inferred, with no explicit reference to joint typicality or binning.
Of auxiliary interest, this work also generalizes and strengthens this soft
covering tool.Comment: To appear in IEEE Trans. on Information Theory (submitted Aug., 2012,
accepted July, 2013), 26 pages, using IEEEtran.cl
Secrecy Through Synchronization Errors
In this paper, we propose a transmission scheme that achieves information
theoretic security, without making assumptions on the eavesdropper's channel.
This is achieved by a transmitter that deliberately introduces synchronization
errors (insertions and/or deletions) based on a shared source of randomness.
The intended receiver, having access to the same shared source of randomness as
the transmitter, can resynchronize the received sequence. On the other hand,
the eavesdropper's channel remains a synchronization error channel. We prove a
secrecy capacity theorem, provide a lower bound on the secrecy capacity, and
propose numerical methods to evaluate it.Comment: 5 pages, 6 figures, submitted to ISIT 201
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages
The secure multiplex coding (SMC) is a technique to remove rate loss in the
coding for wire-tap channels and broadcast channels with confidential messages
caused by the inclusion of random bits into transmitted signals. SMC replaces
the random bits by other meaningful secret messages, and a collection of secret
messages serves as the random bits to hide the rest of messages. In the
previous researches, multiple secret messages were assumed to have independent
and uniform distributions, which is difficult to be ensured in practice. We
remove this restrictive assumption by a generalization of the channel
resolvability technique.
We also give practical construction techniques for SMC by using an arbitrary
given error-correcting code as an ingredient, and channel-universal coding of
SMC. By using the same principle as the channel-universal SMC, we give coding
for the broadcast channel with confidential messages universal to both channel
and source distributions.Comment: We made several changes to improve the presentatio
Strongly Secure Communications Over the Two-Way Wiretap Channel
We consider the problem of secure communications over the two-way wiretap
channel under a strong secrecy criterion. We improve existing results by
developing an achievable region based on strategies that exploit both the
interference at the eavesdropper's terminal and cooperation between legitimate
users. We leverage the notion of channel resolvability for the multiple-access
channel to analyze cooperative jamming and we show that the artificial noise
created by cooperative jamming induces a source of common randomness that can
be used for secret-key agreement. We illustrate the gain provided by this
coding technique in the case of the Gaussian two-way wiretap channel, and we
show significant improvements for some channel configurations.Comment: 11 pages, 7 figures, submitted to IEEE Transactions on Information
Forensics and Security, Special Issue: "Using the Physical Layer for Securing
the Next Generation of Communication Systems
- …