capacity region
Recently Published Documents


TOTAL DOCUMENTS

462
(FIVE YEARS 47)

H-INDEX

37
(FIVE YEARS 3)

Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1518
Author(s):  
Yujie Gu ◽  
Ofer Shayevitz

We study the problem of communicating over a discrete memoryless two-way channel using non-adaptive schemes, under a zero probability of error criterion. We derive single-letter inner and outer bounds for the zero-error capacity region, based on random coding, linear programming, linear codes, and the asymptotic spectrum of graphs. Among others, we provide a single-letter outer bound based on a combination of Shannon’s vanishing-error capacity region and a two-way analogue of the linear programming bound for point-to-point channels, which, in contrast to the one-way case, is generally better than both. Moreover, we establish an outer bound for the zero-error capacity region of a two-way channel via the asymptotic spectrum of graphs, and show that this bound can be achieved in certain cases.


Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1049
Author(s):  
Vamoua Yachongka ◽  
Hideki Yagi ◽  
Yasutada Oohama

In the present paper, we investigate the fundamental trade-off of identification, secret-key, storage, and privacy-leakage rates in biometric identification systems for remote or hidden Gaussian sources. We use a technique of converting the system to one where the data flow is in one-way direction to derive the capacity region of these rates. Also, we provide numerical calculations of three different examples for the system. The numerical results imply that it seems hard to achieve both high secret-key and small privacy-leakage rates simultaneously.


2021 ◽  
Author(s):  
Aditya Narayan Ravi ◽  
Sibi Raj B. Pillai ◽  
Vinod M. Prabhakaran ◽  
Michele Wigger

2021 ◽  
Author(s):  
Saeid Pakravan ◽  
Ghosheh Abed Hodtani

Abstract In this paper, a discrete memoryless wiretap channel with non-causal side information known at the encoder is considered. We (i) characterize capacity region for the Gaussian version of this channel by considering correlation between channel input and side information available at the transmitter; (ii) analyze the impact of correlation on the performance of physical layer security in a Rayleigh fading wiretap channel by deriving closed-form expressions on the average secrecy capacity (ASC) and secrecy outage probability (SOP). Further, to more show the impact of side information, asymptotic behavior of SOP is studied. Numerical evaluation of theoretical results is done finally.


Entropy ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. 756
Author(s):  
Haoheng Yuan ◽  
Bin Dai

The classical Schalkwijk–Kailath (SK) scheme for the point-to-point white Gaussian channel with noiseless feedback plays an important role in information theory due to the fact that it is capacity-achieving and the complexity of its encoding–decoding procedure is extremely low. In recent years, it has been shown that an extended SK feedback scheme also achieves the capacity region of the two-user Gaussian multiple-access channel with noiseless feedback (GMAC-NF), where two independent messages are, respectively, encoded by two intended transmitters. However, for the two-user GMAC-NF with degraded message sets (one common message for both users and one private message for an intended user), the capacity-achieving feedback scheme remains open. In this paper, we propose a novel two-step SK-type feedback scheme for the two-user GMAC-NF with degraded message sets and show that this scheme is capacity-achieving.


Sign in / Sign up

Export Citation Format

Share Document