Loading...
Search for: information-theory
0.007 seconds
Total 437 records

    Power-efficient deterministic and adaptive routing in torus networks-on-chip

    , Article Microprocessors and Microsystems ; Vol. 36, issue. 7 , October , 2012 , pp. 571-585 ; ISSN: 01419331 Rahmati, D ; Sarbazi-Azad, H ; Hessabi, S ; Kiasari, A. E ; Sharif University of Technology
    Abstract
    Modern SoC architectures use NoCs for high-speed inter-IP communication. For NoC architectures, high-performance efficient routing algorithms with low power consumption are essential for real-time applications. NoCs with mesh and torus interconnection topologies are now popular due to their simple structures. A torus NoC is very similar to the mesh NoC, but has rather smaller diameter. For a routing algorithm to be deadlock-free in a torus, at least two virtual channels per physical channel must be used to avoid cyclic channel dependencies due to the warp-around links; however, in a mesh network deadlock freedom can be insured using only one virtual channel. The employed number of virtual... 

    Quantum achievability proof via collision relative entropy

    , Article IEEE Transactions on Information Theory ; Vol. 60, issue. 12 , 2014 , pp. 7980-7986 ; ISSN: 00189448 Beigi, S ; Gohari, A
    Abstract
    In this paper, we provide a simple framework for deriving one-shot achievable bounds for some problems in quantum information theory. Our framework is based on the joint convexity of the exponential of the collision relative entropy and is a (partial) quantum generalization of the technique of Yassaee et al. from classical information theory. Based on this framework, we derive one-shot achievable bounds for the problems of communication over classical-quantum channels, quantum hypothesis testing, and classical data compression with quantum side information. We argue that our one-shot achievable bounds are strong enough to give the asymptotic achievable rates of these problems even up to the... 

    Compound multiple access channel with confidential messages

    , Article 2014 IEEE International Conference on Communications, ICC 2014 ; 10-14 June 2014 , 2014 , Pages 1922-1927 ; ISBN: 9781479920037 Zivari Fard, H ; Akhbari, B ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this paper, we study the problem of secret communication over a Compound Multiple Access Channel (MAC). In this channel, we assume that one of the transmitted messages is confidential that is only decoded by its corresponding receiver and kept secret from the other receiver. For this proposed setting (compound MAC with confidential messages), we derive general inner and outer bounds on the secrecy capacity region. Also, as examples, we investigate 'Less noisy' and 'Gaussian' versions of this channel, and extend the results of the discrete memoryless version to these cases. Moreover, providing numerical examples for the Gaussian case, we illustrate the comparison between achievable rate... 

    A lattice-based threshold secret sharing scheme

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sept , 2014 , pp. 173-179 ; ISBN: 9781479953837 Khorasgani, H. A ; Asaad, S ; Eghlidos, T ; Aref, M ; Sharif University of Technology
    Abstract
    In this paper, we introduce a method of threshold secret sharing scheme in which secret reconstruction is based on celebrated Babai lattice algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there is no quantum threats to these channels. One solution for this problem can be utilization of lattice cryptosystems for these channels which requires designing lattice based secret sharing schemes. We indicate that our scheme is asymptotically correct. Moreover, we analyze the security of our scheme by giving a quantitative proof of security from the view point of information theory  

    Colluding eavesdroppers in large cooperative wireless networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 ; ISBN: 9781479948789 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    Securing communication against non-colluding passive eavesdroppers has been extensively studied. Colluding eavesdroppers were considered for interference-limited large networks. However, collusion was not investigated for large cooperative networks. This paper closes this gap: we study the improvement the eavesdroppers achieve due to collusion in terms of the information leakage rate in a large cooperative network. We consider a dense network with nl legitimate nodes, ne eavesdroppers, and path loss exponent α ≥ 2. We show that if ne (2+2/α) (log ne)γ = o(n l) holds, for some positive γ, then zero-cost secure communication is possible; i.e., ne colluding eavesdroppers can be tolerated. This... 

    Active adversaries from an information-theoretic perspective: Data modification attacks

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2014 , pp. 791-795 ; ISSN: 21578095 Mirmohseni, M ; Papadimitratos, P ; Sharif University of Technology
    Abstract
    We investigate the problem of reliable communication in the presence of active adversaries that can tamper with the transmitted data. We consider a legitimate transmitter-receiver pair connected over multiple communication paths (routes). We propose two new models of adversary, a 'memoryless' and a 'foreseer' adversary. For both models, the adversaries are placing themselves arbitrarily on the routes, keeping their placement fixed throughout the transmission block. This placement may or may not be known to the transmitter. The adversaries can choose their best modification strategy to increase the error at the legitimate receiver, subject to a maximum distortion constraint. We investigate... 

    Diffusion based molecular communication: A simple near optimal receiver

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 7-8 May , 2014 ; Print ISBN: 9781479948789 Mosayebi, R ; Arjmandi, H ; Gohari, A ; Kenari, M. N ; Mitra, U ; Sharif University of Technology
    Abstract
    Nanonetworking indicates new solutions for many applications in biomedical and industrial fields. In this paper, we examine the diffusion-based molecular communication for information transmission in nano-networks. Design of practical decoders for resource-limited nano-networks requires an understanding the fundamental performance limits of memory-limited decoders. While some existing works in the literature do consider decoders with limited memory, to best of our knowledge, the tradeoff between memory and probability of error has not been studied in the literature. In this paper we make a first step by studying this tradeoff for a particular molecular communication channel between two... 

    On dimension bounds for auxiliary quantum systems

    , Article IEEE Transactions on Information Theory ; Vol. 60, Issue. 1 , Jan , 2014 , PP . 368-387 ; ISSN: 00189448 Beigi, S ; Gohari, A ; Sharif University of Technology
    Abstract
    Expressions of several capacity regions in quantum information theory involve an optimization over auxiliary quantum registers. Evaluating such expressions requires bounds on the dimension of the Hilbert space of these auxiliary registers, for which no nontrivial technique is known; we lack a quantum analog of the Carathéodory theorem. In this paper, we develop a new non-Carathéodory-type tool for evaluating expressions involving a single quantum auxiliary register and several classical random variables. As we show, such expressions appear in problems of entanglement-assisted Gray-Wyner and entanglement-assisted channel simulation, where the question of whether entanglement helps in these... 

    Resource allocation using fragmented-spectrum synchronous OFDM-CDMA in cognitive radio networks

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; May , 2014 ; ISBN: 9781479948772 Akhoondi, F ; Poursaeed, O ; Salehi, J. A ; Sharif University of Technology
    Abstract
    This paper presents a fragmented-spectrum synchronous OFDM-CDMA modulation and utilize it as secondary users modulation in a cognitive radio-based network to provide high data rate by efficiently exploiting available spectrum bands in a target spectral range while simultaneously offering multiple-access capability. In particular, given preexisting communications in the spectrum where the system is operating, a channel sensing and estimation method is used to obtain information of subcarrier availability. Given this information, some three-level codes are provided for emerging new cognitive radio users. Furthermore, analytical results of the system performance in a typical cognitive radio... 

    The generalized MAC with partial state and message cooperation

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; May , 2014 ; 978-1-4799-4878-9 Emadi, M. J ; Khormuji, M. N ; Skoglund, M ; Aref, M. R ; Sharif University of Technology
    Abstract
    We consider a two-user state-dependent generalized multiple access channel (GMAC) with correlated channel state information (CSI). It is assumed that the CSI is partially known at each encoder noncausally. We first present an achievable rate region using multi-layer Gelfand-Pinsker coding with partial state and message cooperation between the encoders. We then specialize our result to a Gaussian GMAC with additive interferences that are known partially at each encoder. We show that the proposed scheme can remove the common part known at both encoders and also mitigate a significant part of the independent interference via state cooperation when the feedback links are strong. Thus, the... 

    Physical layer security for some classes of three-receiver broadcast channels

    , Article IET Communications ; Vol. 8, issue. 11 , July , 2014 , p. 1965-1976 Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    Abstract
    In this study, the authors consider the secrecy of a one-receiver, two-eavesdropper broadcast channel (BC) with three degraded message sets. Consider a three-receiver BC with three messages, where the first message is decoded by all the receivers. The second message is decoded by the first and the second receivers and is to be kept secret from the third receiver. The third message is decoded by the first receiver and is to be kept secret from the second and the third receivers. The authors consider the imperfect secrecy condition at the second receiver, that is, it is allowed to partially decode the third message. However, the perfect secrecy condition at the third receiver, does not allow... 

    On hypercontractivity and a data processing inequality

    , Article IEEE International Symposium on Information Theory - Proceedings ; 29 June through 4 July , 2014 , pp. 3022-3026 Anantharam, V ; Gohari, A ; Kamath, S ; Nair, C ; Sharif University of Technology
    Abstract
    In this paper we provide the correct tight constant to a data-processing inequality claimed by Erkip and Cover. The correct constant turns out to be a particular hypercontractivity parameter of (X,Y), rather than their squared maximal correlation. We also provide alternate geometric characterizations for both maximal correlation as well as the hypercontractivity parameter that characterizes the data-processing inequality  

    From source model to quantum key distillation: An improved upper bound

    , Article IWCIT 2014 - Iran Workshop on Communication and Information Theory ; 2014 Keykhosravi, K ; Mahzoon, M ; Gohari, A ; Aref, M.R ; Sharif University of Technology
    Abstract
    In this paper we derive a new upper bound on the quantum key distillation capacity. This upper bound is an extension of the classical bound of Gohari and Anantharam on the source model problem. Our bound strictly improves the quantum extension of reduced intrinsic information bound of Christandl et al. Although this bound is proposed for quantum settings, it also serves as an upper bound for the special case of classical source model, and may improve the bound of Gohari and Anantharam. The problem of quantum key distillation is one in which two distant parties, Alice and Bob, and an adversary, Eve, have access to copies of quantum systems A, B, E respectively, prepared jointly according to... 

    Non-asymptotic output statistics of Random Binning and its applications

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 1849-1853 ; 21578095 (ISSN); 9781479904464 (ISBN) Yassaee, M. H ; Aref, M. R ; Gohari, A ; Sharif University of Technology
    2013
    Abstract
    In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. This framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived  

    Averaging consensus over erasure channels via local synchronization

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 1092-1096 ; 21578095 (ISSN); 9781479904464 (ISBN) Salehkaleybar, S ; Golestani, S. J ; Sharif University of Technology
    2013
    Abstract
    Averaging consensus on the values of nodes in a network is a principal problem in distributed computation. In the presence of erasure channels, conventional averaging consensus algorithms may not converge to the average value if packets are erased in arbitrary order. In this paper, we propose a 'Pseudo-Synchronous Averaging Consensus' (PSAC) algorithm to guarantee averaging consensus over erasure channels by employing tagged packets. We show that the PSAC algorithm has a simple structure and it can work with just two tags '0' and '1'. In asynchronous networks, the PSAC algorithm is a synchronizer in the sense that it keeps the updates of various nodes in step with each other. By exploiting... 

    On AVCs with quadratic constraints

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 271-275 ; 21578095 (ISSN); 9781479904464 (ISBN) Haddadpour, F ; Siavoshani, M. J ; Bakshi, M ; Jaggi, S ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    In this work we study an Arbitrarily Varying Chanel (VC) with quadratic power constraints on the transmitter and a so-called 'oblivious' jammer (along with additional AWGN) under a maximum probability of error criterion, and no private randomness between the transmitter and the receiver. This is in contrast to similar AVC models under the average probability of error criterion considered in [1], [2], and models wherein common randomness is allowed [3] - these distinctions are important in some communication scenarios outlined below. We consider the regime where the jammer's power constraint is smaller than the transmitter's power constraint (in the other regime it is known no positive rate... 

    Joint source-channel coding for Multiple-Access Wiretap Channels

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; 2013 , Pages 369-373 ; 21578095 (ISSN); 9781479904464 (ISBN) Salehkalaibar, S ; Aref, M. R ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider lossy source transmission over a Multiple Access WireTap Channel (MAC-WT). In this model, there are two correlated sources, each of them is available at the corresponding encoder. The receiver tries to reconstruct both sources with desired distortions. The sources should be kept secret from an eavesdropper. We propose a joint source-channel scheme for the MAC-WT. In this scheme, each source sequence is mapped to common and private codewords. The common codeword can be decoded by the eavesdropper. The private codeword needs to be kept secret from the eavesdropper by using Wyner's wiretap coding. We also discuss some special cases of the proposed scheme  

    Improved cardinality bounds on the auxiliary random variables in Marton's inner bound

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1272-1276 ; ISSN: 21578095 ; ISBN: 9781479904464 Anantharam, V ; Gohari, A ; Nair, C ; Sharif University of Technology
    2013
    Abstract
    Marton's region is the best known inner bound for a general discrete memoryless broadcast channel. We establish improved bounds on the cardinalities of the auxiliary random variables. We combine the perturbation technique along with a representation using concave envelopes to achieve this improvement. As a corollary of this result, we show that a randomized time division strategy achieves the entire Marton's region for binary input broadcast channels, extending the previously known result for the sum-rate and validating a previous conjecture due to the same authors  

    A technique for deriving one-shot achievability results in network information theory

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1287-1291 ; ISSN: 21578095 ; ISBN: 9781479904464 Yassaee, M. H ; Aref, M. R ; Gohari, A ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use a stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enhance the capacity region, their use simplifies the analysis. The Jensen inequality lies at the heart of error analysis, which enables us to deal with the expectation of many terms coming from stochastic encoders and decoders at once. The technique is illustrated via four examples: point-to-point... 

    Empirical coordination in a triangular multiterminal network

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 2149-2153 ; ISSN: 21578095 ; ISBN: 9781479904464 Bereyhi, A ; Bahrami, M ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we investigate the problem of the empirical coordination in a triangular multiterminal network. A triangular multiterminal network consists of three terminals where two terminals observe two external i.i.d correlated sequences. The third terminal wishes to generate a sequence with desired empirical joint distribution. For this problem, we derive inner and outer bounds on the empirical coordination capacity region. It is shown that the capacity region of the degraded source network and the inner and outer bounds on the capacity region of the cascade multiterminal network can be directly obtained from our inner and outer bounds. For a cipher system, we establish key distribution...