Loading...
Search for: outer-bounds
0.004 seconds
Total 31 records

    On the secrecy of the cognitive interference channel with partial channel states

    , Article Transactions on Emerging Telecommunications Technologies ; Volume 27, Issue 11 , 2016 , Pages 1472-1485 ; 21615748 (ISSN) Bafghi, H. G ; Seyfe, B ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
    Wiley Blackwell  2016
    Abstract
    The secrecy problem in the state-dependent cognitive interference channel is considered in this paper. In our model, there are a primary and a secondary (cognitive) transmitter–receiver pairs, in which the cognitive transmitter has the message of the primary one as side information. In addition, the channel is affected by two channel state sequences, which are known at the cognitive transmitter and the corresponding receiver, separately. The cognitive transmitter should cooperate with the primary one, and it wishes to keep its message secure at the primary receiver. The achievable equivocation-rate regions for this channel are derived using two approaches: the binning scheme coding and... 

    On Körner-Marton's sum modulo two problem

    , Article IWCIT 2015 - Iran Workshop on Communication and Information Theory, 6 May 2015 through 7 May 2015 ; May , 2015 ; 9781479982356 (ISBN) Sefidgaran, M ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper we study the sum modulo two problem proposed by Körner and Marton. In this source coding problem, two transmitters who observe binary sources X and Y, send messages of limited rate to a receiver whose goal is to compute the sum modulo of X and Y. This problem has been solved for the two special cases of independent and symmetric sources. In both of these cases, the rate pair (H(X|Y), H(Y|X)) is achievable. The best known outer bound for this problem is a conventional cut-set bound, and the best known inner bound is derived by Ahlswede and Han using a combination of Slepian-Wolf and Körner-Marton's coding schemes. In this paper, we propose a new outer bound which is strictly... 

    On AVCs with quadratic constraints

    , Article IEEE International Symposium on Information Theory - Proceedings, Istanbul ; July , 2013 , Pages 271-275 ; 21578095 (ISSN); 9781479904464 (ISBN) Haddadpour, F ; Siavoshani, M. J ; Bakshi, M ; Jaggi, S ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
    2013
    Abstract
    In this work we study an Arbitrarily Varying Chanel (VC) with quadratic power constraints on the transmitter and a so-called 'oblivious' jammer (along with additional AWGN) under a maximum probability of error criterion, and no private randomness between the transmitter and the receiver. This is in contrast to similar AVC models under the average probability of error criterion considered in [1], [2], and models wherein common randomness is allowed [3] - these distinctions are important in some communication scenarios outlined below. We consider the regime where the jammer's power constraint is smaller than the transmitter's power constraint (in the other regime it is known no positive rate... 

    Key agreement over a state-dependent 3-receiver broadcast channel

    , Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) Bahrami, M ; Bereyhi, A ; Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    2013
    Abstract
    In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate receivers while keeping it concealed from the eavesdropper. Simultaneously, the transmitter agrees on a private key with each of the legitimate receivers that needs to be kept secret from the other legitimate receiver and the eavesdropper. For this setup, we derive inner and outer bounds on the... 

    A new outer bound for a class of interference channels with a cognitive relay and a certain capacity result

    , Article IEEE Communications Letters ; Volume 17, Issue 2 , 2013 , Pages 241-244 ; 10897798 (ISSN) Charmchi, H ; Hodtani, G. A ; Nasiri Kenari, M ; Sharif University of Technology
    2013
    Abstract
    The interference channel with a cognitive relay is a variation of the classical two-user interference channel in which a relay aids the transmission among the users. The relay is assumed to have genie-aided cognition: that is it has full, a-priori, knowledge of the messages to be transmitted. We obtain a new outer bound for this channel model and prove capacity for a class of channels in which the transmissions of the two users are non interfering. This capacity result improves on a previous result for the Gaussian case in which the capacity was proved to within a gap of 3 bits/s/Hz  

    Pairwise secret key agreement using the source common randomness

    , Article Proceedings of the International Symposium on Wireless Communication Systems, 28 August 2012 through 31 August 2012 ; Aug , 2012 , Pages 751-755 ; 21540217 (ISSN) ; 9781467307604 (ISBN) Salimi, S ; Skoglund, M ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2012
    Abstract
    A secret key agreement setup between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. The three users observe i.i.d. outputs of correlated sources and there is a noiseless public channel from each user for communication to the others. In this setup, inner and outer bounds of the secret key capacity region is derived. Moreover, some special cases are obtained in which the inner bound coincides the explicit outer bound. Also a binary-erasure example is presented through which the results are examined  

    Hybrid Digital-Analog codes for sending correlated Gaussian sources over an AWGN channel

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 307-311 ; 9781467320733 (ISBN) Abolhassani, M ; Javidbakht, O ; Asaad, S ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we consider the problem of transmitting a Bi-variate Gaussian source S = (S1, S2) over an average-power-limited additive White Gaussian noise (AWGN) channel. The receiver wants to estimate both S1 and S2. We propose a new Hybrid Digital Analog (HDA) joint source-channel coding scheme and obtain its achievable distortion region. For comparison, we also obtain an outer bound for the set of all achievable distortion pairs  

    Layered hybrid digital-analog coding with correlated interference

    , Article IEEE International Conference on Communications ; 2012 , Pages 2565-2569 ; 15503607 (ISSN) ; 9781457720529 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we propose a modified joint source-channel coding (JSCC) scheme on the transmission of an analog Gaussian source over an additive white Gaussian noise (AWGN) channel in the presence of an interference, correlated with the source. This setting naturally generalizes the problem of sending a single Gaussian source over an AWGN channel, in the case of bandwidth-matched, and with uncorrelated interference in which separation-based scheme with Costa coding is optimal. We analyze the modifeied scheme to obtain achievable (mean-squared error) distortion-power tradeoff. For comparison, we also obtain a new outer bound for the achievable distortion-power tradeoff. Using numerical... 

    Coordination via a relay

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3048-3052 ; 9781467325790 (ISBN) Haddadpour, F ; Yassaee, M. H ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study the problem of coordinating two nodes which can only exchange information via a relay at limited rates. The nodes are allowed to do a two-round interactive two-way communication with the relay, after which they should be able to generate i.i.d. copies of two random variables with a given joint distribution within a vanishing total variation distance. We prove inner and outer bounds on the coordination capacity region for this problem. Our inner bound is proved using the technique of "output statistics of random binning" that has recently been developed by Yassaee, et al  

    Channel simulation via interactive communications

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 3053-3057 ; 9781467325790 (ISBN) Yassaee, M. H ; Gohari, A ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d. copies of two random variables and would like to generate i.i.d. copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way communication links, and shared common randomness, all at limited rates. Two special cases of this problem are the interactive function computation studied by Ma and Ishwar, and the tradeoff curve between one-way communication and shared randomness studied by Cuff. The latter work had inspired Gohari and... 

    On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1167-1171 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We investigate the secrecy capacity region of 2-receiver, 1-eavesdropper Broadcast Channel (BC) with two causal states and conferencing decoders. The encoder sends two messages, one of them for both legitimate receivers and the other one for the first legitimate receiver. It keeps these messages secret from the eavesdropper. Each state is causally available at the corresponding receiver, while both states are known causally at the encoder. Each receiver wishes to send the state which is not available at the other receiver, through a noiseless link with limited capacity. We find an inner bound on the secrecy capacity region of this channel. The achievability scheme employs block Markov coding... 

    Multiple-access channel with correlated states and cooperating encoders

    , Article IET Communications ; Volume 6, Issue 13 , 2012 , Pages 1857-1867 ; 17518628 (ISSN) Emadi, M. J ; Zamanighomi, M ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    In this study, a two-user discrete memoryless multiple-access channel with two correlated states known non-causally at the corresponding encoder is considered. Each encoder transmits a message independent of the other encoder's and tries to cooperate with it. To consider cooperative encoders, it is assumed that each encoder strictly-causally receives and finds out the other encoder's transmitted signals and tries to cooperate with the other encoder by transmitting its message. A special case is also studied in which the common part of the states is known at the both encoders, resulting in a larger rate region. For these two scenarios, achievable rate regions are derived using a combination... 

    Simultaneously generating multiple keys in a four-terminal network

    , Article IET Information Security ; Volume 6, Issue 3 , 2012 , Pages 190-201 ; 17518709 (ISSN) Babaheidarian, P ; Salimi, S ; Aref, M. R ; Sharif University of Technology
    IET  2012
    Abstract
    A source model including four terminals is considered, where three simultaneously generating three types of keys are intended. Terminals 1, 2 and 3 wish to share a common key, the secret key, which should be kept secret from terminal 4 and simultaneously terminals 1 and 2 intend to share a private key with terminal 3, which should be kept secret from each other. Also, all the keys should be concealed from terminal 4 (the external wiretapper). The authors assume that all terminals including the external wiretapper have access to distinct correlated i.i.d. sources; there is also a noiseless public channel with unlimited capacity among the terminals. The authors have investigated the model on... 

    Capacity bounds for the three-user Cognitive Z-Interference Channel

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 34-37 ; 9781457707438 (ISBN) Mirmohseni, M ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    In this paper, we consider a three-user cognitive radio network with two primary users and one cognitive radio. We concentrate on a three-user Interference Channel (IFC) where one of the transmitters has cognitive capabilities and non-causally knows the messages of the other two transmitters. Moreover, we assume that the cognitive transmitter does not cause any interference at the receivers of the primary users and we introduce three-user Cognitive Z-Interference Channel (C-ZIFC). We first obtain an inner bound on the capacity region of three-user C-ZIFC, where our coding scheme makes use of collaborative strategy by rate splitting and cooperative strategy by superposition coding. Moreover,... 

    On the transmission of a Gaussian source over an AWGN channel with correlated interference

    , Article 12th Canadian Workshop on Information Theory, CWIT 2011, 17 May 2011 through 20 May 2011 ; May , 2011 , Pages 19-23 ; 9781457707438 (ISBN) Varasteh, M ; Behroozi, H ; Sharif University of Technology
    2011
    Abstract
    We study hybrid digital-analog (HDA) joint source-channel coding schemes in transmitting an analog Gaussian source over an AWGN channel in the presence of an interference, correlated with the source. We analyze these schemes to obtain achievable (mean-squared error) distortion-power tradeoffs. For comparison, we also obtain two outer bounds for the achievable distortion-power tradeoff; those are two necessary conditions under which (D,P) is achievable. Using numerical examples, we demonstrate that, a two-layered coding scheme consisting of analog and Costa coding performs well compared to other provided HDA schemes  

    Rate regions of secret key sharing in a new source model

    , Article IET Communications ; Volume 5, Issue 4 , March , 2011 , Pages 443-455 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, while at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information... 

    Generalised secure distributed source coding with side information

    , Article IET Communications ; Volume 4, Issue 18 , 2010 , Pages 2262-2272 ; 17518628 (ISSN) Salimi, S ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    New inner and outer bounds on the achievable compression-equivocation rate region for generalised secure data compression with side information are given that do not match in general. In this setup, two senders, Alice and Charlie intend to transmit information to Bob via channels with limited capacity so that he can reliably reconstruct their observations. The eavesdropper, Eve, has access to one of the channels at each instant and is interested in the source of the same channel at the time. Bob and Eve also have their own observations, which are correlated with Alice's and Charlie's observations. In this model, two equivocation and compression rates are defined with respect to the sources... 

    Deterministic multiple access wiretap channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 998-1001 ; 9781424469406 (ISBN) Jahandideh, V ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
    2010
    Abstract
    Two-user Multiple Access Channel with a Wire- Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user. For this network single-letter inner and outer bounds for the secrecy capacity region are given. Furthermore, it is shown that in the Deterministic MAC-WT, if the wiretapper channel is a degraded version of the main channel, inner and outer bounds meet and the secrecy capacity region is characterized  

    On the capacity region of a class of Z channels with cooperation

    , Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010 ; October , 2010 , Pages 464-468 ; 9781424460175 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we consider Z Channel (ZC) with cooperation, where there are two senders and two receivers. The first sender transmits information to both receivers and also to the second sender. The first receiver and the second sender cooperate with the first sender in sending messages to the second receiver. The second sender transmits information only to its intended receiver. We first establish an achievable rate region for the general cooperative ZC. The coding scheme is based on rate splitting technique. At the receivers, we use joint decoding strategy. To illustrate the tightness of the proposed inner bound, we define degraded cooperative ZC. We derive an outer bound to the capacity... 

    An outer bound on the capacity region of Broadcast-Relay-Channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 599-603 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we obtain an outer bound on the capacity region of the Broadcast-Relay-Channel (BRC). BRC is a four node network with one source, one relay and two destinations. To the best of our knowledge, this work represents the first effort to find an outer bound on the capacity region of the BRC. In the proof, we jointly utilize the ideas of the outer bounds on the Broadcast Channel (BC) and also the cut-set bound. The proposed outer bound looks like the inner bound obtained by Kramer et. al for BRC