98 research outputs found

    On the Discontinuity of the Shannon Information Measures

    Full text link

    Unsteady waves generated by two ships with different speeds

    Get PDF
    This paper discusses the development of a methodology to predict the waves generated by two ships with different speeds and the development of an uncoupled method to predict the encountering, overtaking and crossing scenarios

    All Inequalities for the Relative Entropy

    Full text link
    The relative entropy of two n-party quantum states is an important quantity exhibiting, for example, the extent to which the two states are different. The relative entropy of the states formed by reducing two n-party to a smaller number mm of parties is always less than or equal to the relative entropy of the two original n-party states. This is the monotonicity of relative entropy. Using techniques from convex geometry, we prove that monotonicity under restrictions is the only general inequality satisfied by relative entropies. In doing so we make a connection to secret sharing schemes with general access structures. A suprising outcome is that the structure of allowed relative entropy values of subsets of multiparty states is much simpler than the structure of allowed entropy values. And the structure of allowed relative entropy values (unlike that of entropies) is the same for classical probability distributions and quantum states.Comment: 15 pages, 3 embedded eps figure

    On the optimization of bipartite secret sharing schemes

    Get PDF
    Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem. In this paper, we study it for bipartite access structures, in which the set of participants is divided in two parts, and all participants in each part play an equivalent role. We focus on the search of lower bounds by using a special class of polymatroids that is introduced here, the bipartite ones. We present a method based on linear programming to compute, for every given bipartite access structure, the best lower bound that can be obtained by this combinatorial method. In addition, we obtain some general lower bounds that improve the previously known ones, and we construct optimal secret sharing schemes for a family of bipartite access structures.Postprint (author’s final draft

    On the rate-distortion region for multiple descriptions

    No full text
    10.1109/TIT.2002.1013140IEEE Transactions on Information Theory4872012-2021IETT

    Some basic properties of fix-free codes

    No full text

    Secure error‐correcting network codes with side information leakage

    No full text
    corecore