Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage

Total Page:16

File Type:pdf, Size:1020Kb

Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage Thomas Jerkovits Onur Günlü Vladimir Sidorenko [email protected] [email protected] Gerhard Kramer German Aerospace Center TU Berlin [email protected] Weçling, Germany Berlin, Germany [email protected] TU Munich Munich, Germany ABSTRACT them as physical “one-way functions” that are easy to compute and A key agreement problem is considered that has a biometric or difficult to invert [33]. physical identifier, a terminal for key enrollment, and a terminal There are several security, privacy, storage, and complexity con- for reconstruction. A nested convolutional code design is proposed straints that a PUF-based key agreement method should fulfill. First, that performs vector quantization during enrollment and error the method should not leak information about the secret key (neg- control during reconstruction. Physical identifiers with small bit ligible secrecy leakage). Second, the method should leak as little error probability illustrate the gains of the design. One variant of information about the identifier (minimum privacy leakage). The the nested convolutional codes improves on the best known key privacy leakage constraint can be considered as an upper bound vs. storage rate ratio but it has high complexity. A second variant on the secrecy leakage via the public information of the first en- with lower complexity performs similar to nested polar codes. The rollment of a PUF about the secret key generated by the second results suggest that the choice of code for key agreement with enrollment of the same PUF [12]. Third, one should limit the stor- identifiers depends primarily on the complexity constraint. age rate because storage can be expensive and limited, e.g., for internet-of-things (IoT) device applications. Similarly, the hardware CCS CONCEPTS cost, e.g., hardware area, of the encoder and decoder used for key agreement with PUFs should be small for such applications. • Security and privacy → Information-theoretic techniques. There are two common models for key agreement: the generated- KEYWORDS secret (GS) and the chosen-secret (CS) models. An encoder extracts a nested codes, information privacy, tailbiting, convolutional codes, secret key from an identifier measurement for the GS model, while physical unclonable functions for the CS model a secret key that is independent of the identifier ACM Reference Format: measurements is given to the encoder by a trusted entity. In the clas- Thomas Jerkovits, Onur Günlü, Vladimir Sidorenko, and Gerhard Kramer. sic key-agreement model introduced in [1] and [31], two terminals 2020. Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Stor- observe correlated random variables and have access to a public, age. In 2020 ACM Workshop on Information Hiding and Multimedia Security authenticated, and one-way communication link; an eavesdropper (IH&MMSec’20), June 22–24, 2020, Denver, CO, USA. ACM, New York, NY, observes only the public messages called helper data. The regions USA, 11 pages. https://doi.org/10.1145/3369412.3395063 of achievable secret-key vs. privacy-leakage (key-leakage) rates for the GS and CS models are given in [19, 26]. The storage rates 1 INTRODUCTION for general (non-negligible) secrecy-leakage levels are analyzed in Irises and fingerprints are biometric identifiers used to authenticate [23], while the rate regions with multiple encoder and decoder mea- and identify individuals, and to generate secret keys [4]. In a digital surements of a hidden source are treated in [16]. There are other device, there are digital circuits that have outputs unique to the key-agreement models with an eavesdropper that has access to a device. One can generate secret keys from such physical unclonable sequence correlated with the identifier outputs, e.g., in[6, 8, 12, 22]. arXiv:2004.13095v1 [cs.IT] 27 Apr 2020 functions (PUFs) by using their outputs as a source of randomness. This model is not realistic for PUFs, unlike physical-layer security Fine variations of ring oscillator (RO) outputs, the start-up behavior primitives and some biometric identifiers that are continuously of static random access memories (SRAM), and quantum-physical available for physical attacks. PUFs are used for on-demand key readouts through coherent scattering [37] can serve as PUFs that reconstruction, i.e., the attack should be performed during execu- have reliable outputs and high entropy [11, 18]. One can consider tion, and an invasive attack applied to obtain a correlated sequence permanently changes the identifier output [11, 13]. Therefore, we Permission to make digital or hard copies of all or part of this work for personal or assume that the eavesdropper cannot obtain a sequence correlated classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation with the PUF outputs. on the first page. Copyrights for components of this work owned by others than ACM Two classic code constructions for key agreement are code-offset must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fuzzy extractors (COFE) [10] and the fuzzy commitment scheme fee. Request permissions from [email protected]. (FCS) [21], which are based on a one-time padding step in combi- IH&MMSec ’20, June 22–24, 2020, Denver, CO, USA nation with an error correcting code. Both constructions require © 2020 Association for Computing Machinery. a storage rate of 1 bit/symbol due to the one-time padding step. A ACM ISBN 978-1-4503-7050-9/20/06...$15.00 https://doi.org/10.1145/3369412.3395063 Slepian-Wolf (SW) [38] coding method, which corresponds to syn- codes. In Section 5, we propose a design procedure for the new drome coding for binary sequences, is proposed in [5] to reduce the nested TBCCs adapted to the key agreement with PUFs problem. storage rate so that it is equal to the privacy-leakage rate. It is shown Section 6 compares the estimated decoding complexity of TBCCs in [14] that these methods do not achieve the key-leakage-storage and PCs. Section 7 illustrates the significant gains from nested boundaries of the GS and CS models. convolutional codes designed for practical PUF parameters as com- Wyner-Ziv (WZ) [42] coding constructions that bin the observed pared to previously-proposed nested PCs and other channel codes sequences are shown in [14] to be optimal deterministic code con- in terms of the key vs. storage rate ratio. structions for key agreement with PUFs. Nested random linear codes are shown to asymptotically achieve boundary points of the 2 PRELIMINARIES key-leakage-storage region. A second WZ-coding construction uses 2.1 Notation a nested version of polar codes (PCs) [3], which are designed in [14] F Fa×b for practical SRAM PUF parameters to illustrate that rate tuples Let 2 denote the finite field of order 2 and let 2 denote the set that cannot be achieved by using previous code constructions can of all a × b matrices over F2. Rows and columns of a × b matrices be achieved by nested PCs. are indexed by 1;:::; a and 1;:::;b, and hi; j is the element in the Fa A closely related problem to the key agreement problem is i-th row and j-th column of a matrix H. 2 denotes the set of all Wyner’s wiretap channel (WTC) [41]. The main aim in the WTC row vectors of length a over F2. With 0a×b we denote the all-zero problem is to hide a transmitted message from the eavesdropper matrix of size a × b. A linear block code over F2 of length N and FN that observes a channel output correlated with the observation of dimension K is a K-dimensional subspace of 2 and denoted by ¹N; Kº. A variable with superscript denotes a string of variables, a legitimate receiver. There are various code constructions for the n WTC that achieve the secrecy capacity, e.g., in [2, 25, 28, 30], and e.g., X =X1 ::: Xi ::: Xn, and a subscript denotes the position of a some of these constructions use nested PCs, e.g., [2, 28]. Similarly, variable in a string. A random variable X has probability distribution nested PCs are shown in [7] to achieve the strong coordination PX . Calligraphic letters such as X denote sets, and set sizes are capacity boundaries, defined and characterized in [9]. written as jXj. Enc¹·º is an encoder mapping and Dec¹·º is a decoder We design codes for key agreement with PUFs by constructing mapping. Hb ¹xº = −x log x −¹1−xº log¹1−xº is the binary entropy nested convolutional codes. Due to the broad use of nested codes in, function, where we take logarithms to the base 2. The ∗-operator is e.g., WTC and strong coordination problems, the proposed nested defined as p∗x = p¹1−xº+¹1−pºx. A BSC with crossover probability n n convolutional code constructions can be useful also for these prob- p is denoted by BSC(p). X ∼ Bern ¹αº is an independent and lems. A summary of the main contributions is as follows. identically distributed (i.i.d.) binary sequence of random variables T with Pr»Xi = 1¼ = α for i = 1; 2;:::;n. H represents the transpose • We propose a method to obtain nested tailbiting convolu- of the matrix H. Drawing an element e from a set E uniformly at tional codes (TBCCs) that are used as a WZ-coding construc- random is denoted by tion, which is a binning method used in various achievability $ schemes and can be useful for various practical code con- e −E: (1) structions.
Recommended publications
  • Group Testing
    Group Testing Amit Kumar Sinhababu∗ and Vikraman Choudhuryy Department of Computer Science and Engineering, Indian Institute of Technology Kanpur April 21, 2013 1 Motivation Out original motivation in this project was to study \coding theory in data streaming", which has two aspects. • Applications of theory correcting codes to efficiently solve problems in the model of data streaming. • Solving coding theory problems in the model of data streaming. For ex- ample, \Can one recognize a Reed-Solomon codeword in one-pass using only poly-log space?" [1] As we started, we were directed to a related combinatorial problem, \Group testing", which is important on its own, having connections with \Compressed Sensing", \Data Streaming", \Coding Theory", \Expanders", \Derandomiza- tion". This project report surveys some of these interesting connections. 2 Group Testing The group testing problem is to identify the set of \positives" (\defectives", or \infected", or 1) from a large set of population/items, using as few tests as possible. ∗[email protected] [email protected] 1 2.1 Definition There is an unknown stream x 2 f0; 1gn with at most d ones in it. We are allowed to test any subset S of the indices. The answer to the test tells whether xi = 0 for all i 2 S, or not (at least one xi = 1). The objective is to design as few tests as possible (t tests) such that x can be identified as fast as possible. Group testing strategies can be either adaptive or non-adaptive. A group testing algorithm is non-adaptive if all tests must be specified without knowing the outcome of other tests.
    [Show full text]
  • DRASIC Distributed Recurrent Autoencoder for Scalable
    DRASIC: Distributed Recurrent Autoencoder for Scalable Image Compression Enmao Diao∗, Jie Dingy, and Vahid Tarokh∗ ∗Duke University yUniversity of Minnesota-Twin Cities Durham, NC, 27701, USA Minneapolis, MN 55455, USA [email protected] [email protected] [email protected] Abstract We propose a new architecture for distributed image compression from a group of distributed data sources. The work is motivated by practical needs of data-driven codec design, low power con- sumption, robustness, and data privacy. The proposed architecture, which we refer to as Distributed Recurrent Autoencoder for Scalable Image Compression (DRASIC), is able to train distributed encoders and one joint decoder on correlated data sources. Its compression capability is much bet- ter than the method of training codecs separately. Meanwhile, the performance of our distributed system with 10 distributed sources is only within 2 dB peak signal-to-noise ratio (PSNR) of the performance of a single codec trained with all data sources. We experiment distributed sources with different correlations and show how our data-driven methodology well matches the Slepian- Wolf Theorem in Distributed Source Coding (DSC). To the best of our knowledge, this is the first data-driven DSC framework for general distributed code design with deep learning. 1 Introduction It has been shown by a variety of previous works that deep neural networks (DNN) can achieve comparable results as classical image compression techniques [1–9]. Most of these methods are based on autoencoder networks and quantization of bottleneck representa- tions. These models usually rely on entropy codec to further compress codes. Moreover, to achieve different compression rates it is unavoidable to train multiple models with different regularization parameters separately, which is often computationally intensive.
    [Show full text]
  • MASTER of ADVANCED STUDY New Professional Degrees for Engineers University of California, San Diego of California, University
    pulse cover12_Layout 1 6/22/11 3:46 PM Page 1 Entrepreneurism Center • Research Expo 2011 In Memory of Jack Wolf Jacobs School of Engineering News PulseSummer 2011 MASTER OF ADVANCED STUDY New Professional Degrees for Engineers University of California, San Diego of California, University > dean’s column < New Interdisciplinary Degree Programs for Engineering Professionals Jacobs School of Engineering The most exciting and innovative engineering often occurs on the interface between traditional disciplines. We are extending our interdisciplinary Leadership Dean: Frieder Seible collaborations — which have always been at the core of the Jacobs School culture Associate Dean: Jeanne Ferrante — to new graduate education programs for engineering professionals. Associate Dean: Charles Tu Associate Dean for Administration and Finance: Beginning this fall, the Jacobs School will offer four new interdisciplinary Steve Ross Master of Advanced Study (MAS) programs for working engineers: Wireless Executive Director of External Relations: Embedded Systems, Medical Device Engineering, Structural Health Monitoring, Denine Hagen and Simulation-Based Engineering. Academic Departments Bioengineering: Shankar Subramanian, Chair TThese master degree programs are engineering equivalents of MBA programs Computer Science and Engineering: at business management schools. Geared to early- to mid-career engineers Rajesh Gupta, Chair Electrical and Computer Engineering: with practical work experience, our new MAS programs align faculty research Yeshaiahu Fainman, Chair strengths with industry workforce needs. The curricula are always jointly offered Mechanical and Aerospace Engineering: by two academic departments, so that the training focuses in a practical way on Sutanu Sarkar, Chair NanoEngineering: industry-specific application areas that are not available through traditional master Kenneth Vecchio, Chair degree programs.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 63, No. 3, September 2013 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Ioannis Kontoyiannis, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú Annual Awards Announced The main annual awards of the • 2013 IEEE Jack Keil Wolf ISIT IEEE Information Theory Society Student Paper Awards were were announced at the 2013 ISIT selected and announced at in Istanbul this summer. the banquet of the Istanbul • The 2014 Claude E. Shannon Symposium. The winners were Award goes to János Körner. the following: He will give the Shannon Lecture at the 2014 ISIT in 1) Mohammad H. Yassaee, for Hawaii. the paper “A Technique for Deriving One-Shot Achiev - • The 2013 Claude E. Shannon ability Results in Network Award was given to Katalin János Körner Daniel Costello Information Theory”, co- Marton in Istanbul. Katalin authored with Mohammad presented her Shannon R. Aref and Amin A. Gohari Lecture on the Wednesday of the Symposium. If you wish to see her slides again or were unable to attend, a copy of 2) Mansoor I. Yousefi, for the paper “Integrable the slides have been posted on our Society website. Communication Channels and the Nonlinear Fourier Transform”, co-authored with Frank. R. Kschischang • The 2013 Aaron D. Wyner Distinguished Service Award goes to Daniel J. Costello. • Several members of our community became IEEE Fellows or received IEEE Medals, please see our web- • The 2013 IT Society Paper Award was given to Shrinivas site for more information: www.itsoc.org/honors Kudekar, Tom Richardson, and Rüdiger Urbanke for their paper “Threshold Saturation via Spatial Coupling: The Claude E.
    [Show full text]
  • 2010 Roster (V: Indicates Voting Member of Bog)
    IEEE Information Theory Society 2010 Roster (v: indicates voting member of BoG) Officers Frank Kschischang President v Giuseppe Caire First Vice President v Muriel M´edard Second Vice President v Aria Nosratinia Secretary v Nihar Jindal Treasurer v Andrea Goldsmith Junior Past President v Dave Forney Senior Past President v Governors Until End of Alexander Barg 2010 v Dan Costello 2010 v Michelle Effros 2010 v Amin Shokrollahi 2010 v Ken Zeger 2010 v Helmut B¨olcskei 2011 v Abbas El Gamal 2011 v Alex Grant 2011 v Gerhard Kramer 2011 v Paul Siegel 2011 v Emina Soljanin 2011 v Sergio Verd´u 2011 v Martin Bossert 2012 v Max Costa 2012 v Rolf Johannesson 2012 v Ping Li 2012 v Hans-Andrea Loeliger 2012 v Prakash Narayan 2012 v Other Voting Members of BoG Ezio Biglieri IT Transactions Editor-in-Chief v Bruce Hajek Chair, Conference Committee v total number of voting members: 27 quorum: 14 1 Standing Committees Awards Giuseppe Caire Chair, ex officio 1st VP Muriel M´edard ex officio 2nd VP Alexander Barg new Max Costa new Elza Erkip new Ping Li new Andi Loeliger new Ueli Maurer continuing En-hui Yang continuing Hirosuke Yamamoto new Ram Zamir continuing Aaron D. Wyner Award Selection Frank Kschischang Chair, ex officio President Giuseppe Caire ex officio 1st VP Andrea Goldsmith ex officio Junior PP Dick Blahut new Jack Wolf new Claude E. Shannon Award Selection Frank Kschischang Chair, ex officio President Giuseppe Caire ex officio 1st VP Muriel M´edard ex officio 2nd VP Imre Csisz`ar continuing Bob Gray continuing Abbas El Gamal new Bob Gallager new Conference
    [Show full text]
  • Andrew J. and Erna Viterbi Family Archives, 1905-20070335
    http://oac.cdlib.org/findaid/ark:/13030/kt7199r7h1 Online items available Finding Aid for the Andrew J. and Erna Viterbi Family Archives, 1905-20070335 A Guide to the Collection Finding aid prepared by Michael Hooks, Viterbi Family Archivist The Andrew and Erna Viterbi School of Engineering, University of Southern California (USC) First Edition USC Libraries Special Collections Doheny Memorial Library 206 3550 Trousdale Parkway Los Angeles, California, 90089-0189 213-740-5900 [email protected] 2008 University Archives of the University of Southern California Finding Aid for the Andrew J. and Erna 0335 1 Viterbi Family Archives, 1905-20070335 Title: Andrew J. and Erna Viterbi Family Archives Date (inclusive): 1905-2007 Collection number: 0335 creator: Viterbi, Erna Finci creator: Viterbi, Andrew J. Physical Description: 20.0 Linear feet47 document cases, 1 small box, 1 oversize box35000 digital objects Location: University Archives row A Contributing Institution: USC Libraries Special Collections Doheny Memorial Library 206 3550 Trousdale Parkway Los Angeles, California, 90089-0189 Language of Material: English Language of Material: The bulk of the materials are written in English, however other languages are represented as well. These additional languages include Chinese, French, German, Hebrew, Italian, and Japanese. Conditions Governing Access note There are materials within the archives that are marked confidential or proprietary, or that contain information that is obviously confidential. Examples of the latter include letters of references and recommendations for employment, promotions, and awards; nominations for awards and honors; resumes of colleagues of Dr. Viterbi; and grade reports of students in Dr. Viterbi's classes at the University of California, Los Angeles, and the University of California, San Diego.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 51, No. 3, September 2001 Editor: Lance C. Pérez ISSN 1059-2362 2001 Shannon Lecture Constrained Sequences, Crossword Puzzles and Shannon Jack Keil Wolf University of California, San Diego and QUALCOMM Incorporated One-dimensional con- tween every pair of uncon- strained sequences play an strained binary digits unless important role in both com- that pair of digits is both 0’s munication and storage sys- in which case insert a 1. tems. Many interesting Using this rule the uncon- constraints exist, e.g., bal- strained sequence …11010 anced codes, (d,k) codes, etc. 0 0 …becomes the con- strained sequence … 1 0 100 Initially we will concentrate 0 1001010 … where the in- on one-dimensional binary serted binary digits are un- (d,k) sequences [1]. These se- derlined. Decoding consists quences are described by two of removing the underlined integers, d and k, 0 ≤ d<k, binary digits. This is an ex- such that there are at least d ample of a fixed rate code in and at most k 0’s before and that the number of con- after every 1. As an example, Jack Wolf presenting the 2001 Shannon Lecture in strained binary digits is al- … 01010001001010 … is a seg- Washington D. C. ways a constant times the ment of an allowable (1,3) se- number of unconstrained binary digits. It is also an ex- quence while … 0110001000010 …is not, due to the ample of a systematic code in that the unconstrained bi- violations that are underlined. nary digits are present in the stream of constrained There is an abundance of literature on the applications binary digits.
    [Show full text]
  • An Efficient Hardware Implementation of LDPC Decoder Monazzahalsadat Yasoubi a Thesis in the Department of Electrical and Comput
    An Efficient Hardware Implementation of LDPC Decoder Monazzahalsadat Yasoubi A Thesis In the Department of Electrical and Computer Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Master of Applied Science (Electrical and Computer Engineering) at Concordia University Montreal, Quebec, Canada February 2020 © Monazzahalsadat Yasoubi, 2020 CONCORDIA UNIVERSITY SCHOOL OF GRADUATE STUDIES This is to certify that the thesis prepared By: Monazzahalsadat Yasoubi Entitled: An Efficient Hardware Implementation of LDPS Decoder and submitted in partial fulfillment of the requirements for the degree of Master of Applied Science Complies with the regulations of this University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: ________________________________________________ Chair Dr. M. Medraj (MIAE) ________________________________________________ Examiner, External Dr. M. Medraj (MIAE) To the Program ________________________________________________ Examiner Dr. Y. R. Shayan ________________________________________________ Supervisor Dr. M. R. Soleymani ________________________________________________ Co-Supervisor Dr. Approved by: ___________________________________________ Dr. Yousef R. Shayan, Chair Department of Electrical and Computer Engineering _______13/02/2020____ ___________________________________ Dr. Amir Asif, Dean Gina Cody School of Engineering and Computer Science Abstract An Efficient Hardware Implementation of LDPC Decoder Monazzahalsadat
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 66, No. 3, September 2016 Editor: Michael Langberg ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, Sergio Verdú, and Parham Noorzad President’s Column Alon Orlitsky ISIT in Barcelona was true joy. Like a Gaudi sion for our community along with extensive masterpiece, it was artfully planned and flaw- experience as board member, associate editor, lessly executed. Five captivating plenaries and a first-class researcher. Be-earlied con- covered the gamut from communication and gratulations, Madam President. coding to graphs and satisfiability, while Al- exander Holevo’s Shannon Lecture reviewed Other decisions and announcements con- the fascinating development of quantum cerned the society’s major awards, including channels from his early theoretical contribu- three Jack Wolf student paper awards and the tions to today’s near-practical innovations. James Massey Young Scholars Award that The remaining 620 talks were presented in 9 went to Andrea Montanari. Surprisingly, the parallel sessions and, extrapolating from those IT Paper Award was given to two papers, I attended, were all superb. Two records were “The Capacity Region of the Two-Receiver broken, with 888 participants this was the Gaussian Vector Broadcast Channel With Pri- largest ISIT outside the US, and at 540 Euro vate and Common Messages” by Yanlin Geng registration, the most economical in a decade. and Chandra Nair, and “Fundamental Limits of Caching” by Mohammad Maddah-Ali and Apropos records, and with the recent Rio Games, isn’t ISIT Urs Niesen. While Paper Awards were given to two related like the Olympics, except even better? As with the ultimate papers recently, not since 1972 were papers on different top- sports event, we convene to show our best results, further our ics jointly awarded.
    [Show full text]
  • Multivariate Decoding of Reed-Solomon Codes
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Algebraic list-decoding of error-correcting codes Permalink https://escholarship.org/uc/item/68q346tn Author Parvaresh, Farzad Publication Date 2007 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Algebraic List-Decoding of Error-Correcting Codes A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering (Communications Theory and Systems) by Farzad Parvaresh Committee in charge: Professor Alexander Vardy, Chair Professor Ilya Dumer Professor Alon Orlitsky Professor Paul H. Siegel Professor Jack K. Wolf 2007 Copyright Farzad Parvaresh, 2007 All rights reserved. The dissertation of Farzad Parvaresh is approved, and it is acceptable in quality and form for publication on microfilm: Chair University of California, San Diego 2007 iii To my parents iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . vii Acknowledgements . viii Vita and Publications . xi Abstract of the Dissertation . xii Chapter 1 Introduction . 1 1.1 Contributions . 5 1.2 Waiting for a bus in front of a pub . 8 1.2.1 Reed-Solomon codes . 9 1.2.2 Guruswami-Sudan algorithm . 10 1.2.3 Multivariate interpolation decoding algorithm . 12 1.3 Waiting for a bus on an April Fool’s day . 15 1.4 A new kind of Tic-Tac-Toe with multiplicity . 18 Chapter 2 Multivariate decoding of Reed-Solomon codes . 21 2.1 Introduction . 22 2.2 Preliminaries . 27 2.3 Error-correction radius of the MID algorithm .
    [Show full text]
  • A First Course in Information Theory Information Technology: Transmission, Processing, and Storage
    A First Course in Information Theory Information Technology: Transmission, Processing, and Storage Series Editor: Jack Keil Wolf University of California at San Diego La Jolla, California Editorial Board: Robert J. McEliece California Institute of Technology Pasadena, California John Proakis Northeastern University Boston, Massachusetts William H. Tranter Virginia Polytechnic Institute and State University Blacksburg, Virginia A First Course in Information Theory Raymond W. Yeung Multi-Carrier Digital Communications: Theory and Applications of OFDM Ahmad R. S. Bahai and Burton R. Saltzberg Nonuniform Sampling: Theory and Practice Edited by Farokh Marvasti Principles of Digital Transmission: With Wireless Applications Sergio Benedetto and Ezio Biglieri Simulation of Communication Systems, Second Edition: Methodology, Modeling, and Techniques Michel C. Jeruchim, Philip Balaban, and K. Sam Shanmugan A Continuation Order Plan is available for this series. A continuation order will bring delivery of each new volume immediately upon publicati on. Volumes are billed only upon actual shipment. For further information please contact the publisher. A First Course in Information Theory Raymond w. Yeung The Chinese University of Hong Kong ~ Springer Additional material to this book can be downloaded from http://extras.springer.com. ISBN 978-1-4613-4645-6 ISBN 978-1-4419-8608-5 (eBook) DOI 10.1007/978-1-4419-8608-5 © 2002 Springer Science+Business Media New York Originally published by Springer Science+Business Media, fuc in 2002 Softcover reprint ofthe hardcover lst edition 2002 Ali rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC) except for brief excerpts in connection with reviews or scholarly analysis.
    [Show full text]
  • Non-Binary Distributed Arithmetic Coding
    Non-binary Distributed Arithmetic Coding by Ziyang Wang Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For the Masc degree in Electrical and Computer Engineering Department of Electrical and Computer Engineering Faculty of Engineering University of Ottawa c Ziyang Wang, Ottawa, Canada, 2015 Abstract Distributed source coding (DSC) is a fundamental concept in information theory. It refers to distributed compression of correlated but geographically separated sources. With the development of wireless sensor networks, DSC has attracted great research interest in the recent years [26]. Although many channel code based DSC schemes have been developed (e.g., those based on turbo codes [11]and LDPC codes [20]), this thesis focuses on the arithmetic coding based approaches, namely, Distributed Arithmetic Coding (DAC) due to its simplicity in encoding [8]. To date, most of the DAC approaches that have been proposed deal with binary sources and can not handle non-binary cases. Little research has been done to extend DAC for non-binary sources. This work aims at developing efficient DAC techniques for the compression of non-binary sources. The key idea of DAC is representing the source symbols by overlapping intervals, as opposed to the case of conventional arithmetic coding where the intervals representing the symbols do not overlap. However the design of the overlapping intervals has been com- pletely of heuristic nature to date. As such, the first part of this work is a thorough study of various interval-overlapping rules in binary DAC so as to understand how these rules im- pact the performance of DAC.
    [Show full text]