On Compressing Encrypted Data

Size: px
Start display at page:

Download "On Compressing Encrypted Data"

Transcription

1 O Compressig Ecrypted Data Mark Johso, Prakash Ishwar, Viod M. Prabhakara, Daiel Schoberg, ad Kaa Ramchadra Departmet of Electrical Egieerig ad Computer Scieces, Uiversity of Califoria, Berkeley, CA 94720, USA. {mjohso, ishwar, viodmp, dschobe, Abstract Whe it is desired to trasmit redudat data over a isecure ad badwidth-costraied chael, it is customary to first compress the data ad the ecrypt it. I this paper, we ivestigate the ovelty of reversig the order of these steps, i.e., first ecryptig ad the compressig, without compromisig either the compressio efficiecy or the iformatio-theoretic security. Although couter-ituitive, we show surprisigly that, through the use of codig with side iformatio priciples, this reversal of order is ideed possible i some settigs of iterest without loss of either optimal codig efficiecy or perfect secrecy. We show that i certai scearios our scheme requires o more radomess i the ecryptio key tha the covetioal system where compressio precedes ecryptio. I additio to provig the theoretical feasibility of this reversal of operatios, we also describe a system which implemets compressio of ecrypted data. I. INTRODUCTION Cosider the problem of trasmittig redudat data over a isecure, badwidth-costraied commuicatios chael. It is desirable to both compress ad ecrypt the data. The traditioal way to do this, show i Figure, is to first compress the data to strip it of its redudacy followed by ecryptio of the compressed bitstream. The source is first compressed to its etropy rate usig a stadard source coder. The, the compressed source is This research was supported by NSF uder grats CCR , CCR , ad CCR ad DARPA uder grat F Mark Johso s work is supported by the Faie ad Joh Hertz Foudatio

2 2 ecrypted usig oe of the may widely available ecryptio techologies. At the receiver, decryptio is performed first, followed by decompressio. Eavesdropper Message Source Compressio Ecryptio Public chael Decryptio Decompressio Recostructed Source Secure chael Key Fig.. Covetioal system: The ecoder first compresses the source ad the ecrypts before trasmittig over a public chael. The decoder first decrypts the received bitstream ad the decompresses the result. I this paper, we ivestigate the ovelty of reversig the order of these steps, i.e., first ecryptig ad the compressig the ecrypted source, as show i Figure 2. The compressor does ot have access to the cryptographic key, so it must be able to compress the ecrypted data (also called ciphertext) without ay kowledge of the origial source. At first glace, it appears that oly a miimal compressio gai, if ay, ca be achieved, sice the output of a ecryptor will look very radom. However, at the receiver, there is a decoder i which both decompressio ad decryptio are performed i a joit step. The fact that the decoder ca use the cryptographic key to assist i the decompressio of the received bitstream leads to the possibility that we may be able to compress the ecrypted source. I fact, we show that a sigificat compressio ratio ca be achieved if compressio is performed after ecryptio. This is true for both lossless ad lossy compressio. I some cases, we ca eve achieve the same compressio ratio as i the stadard case of first compressig ad the ecryptig. The fact that we ca still compress the ecrypted source follows directly from distributed source codig theory. Whe we cosider the case of lossless compressio, we use the Slepia-Wolf theorem [] to show that we ca achieve the same compressio gai as if we had compressed the origial, uecrypted source. For the case of lossy compressio, the Wyer-Ziv theorem [2] dictates the compressio gais that ca be achieved. If the origial source is Gaussia, the we ca achieve the

3 3 Eavesdropper Message Source Ecryptio Compressio Public chael Joit decompressio ad decryptio Recostructed Source Secure chael Key Fig. 2. Proposed system: The source is first ecrypted ad the compressed. The compressor does ot have access to the key used i the ecryptio step. At the decoder, decompressio ad decryptio are performed i a sigle joit step. same compressio efficiecy, for ay fixed distortio, as whe we compress before ecryptig. For more geeral sources, we caot achieve the same compressio gais as i the covetioal system, which is a direct result of the rate-loss of the uderlyig Wyer-Ziv problem. All of these claims relate to the theoretical limits of compressig a ecrypted source, ad are demostrated via o-costructive, existece proofs. However, i additio to studyig the theoretical bouds, we also implemet a system where the compressio step follows the ecryptio. We will describe the costructio of this system ad preset computer simulatios of its performace We also ivestigate the security provided by a system where a message is first ecrypted ad the compressed. We first defie a measure of secrecy based o the statistical correlatio of the origial source ad the compressed, ecrypted source. The, we show that the reversed cryptosystem i Figure 2 ca still have perfect secrecy uder some coditios. While we focus here o the fact that the reversed cryptosystem ca match the performace of a covetioal system, we have ucovered a few applicatio scearios where the reversed system might be preferable. I oe such sceario, we ca imagie that some cotet, either discrete or cotiuous i ature, is beig distributed over a etwork. We will further assume that the cotet ower ad the etwork operator are two distict etities, ad do ot trust each other. The cotet ower is very iterested i protectig the privacy of the cotet via ecryptio. However, because the ower has o icetive to compress his data, he will ot use his limited computatioal

4 4 resources to ru a compressio algorithm before ecryptig the data. The etwork operator, o the other had, has a overridig iterest i compressig all etwork traffic, i order to maximize etwork utilizatio ad, therefore, maximize his profit. However, because the cotet ower does ot trust the etwork operator, the ower will ot supply the cryptographic key that was used to ecrypt the data. The etwork operator is forced to compress the data after it has bee ecrypted. Our work was primarily ispired by recet code costructios for the distributed source codig problem [3], which we use i the compressio stage of our system. We are ot aware of ay previous literature o the topic of compressig data that has already bee ecrypted. The two mai cotributios of this work are the idetificatio of the coectio betwee the stated problem ad distributed source codig, ad the demostratio that i some scearios reversig the order of ecryptio ad compressio does ot compromise either the compressio efficiecy or the security. This paper is orgaized i the followig maer. Sectio II gives some backgroud iformatio o distributed source codig. The topics preseted i that sectio will be used subsequetly to develop a efficiet system for compressig ecrypted data. I Sectio III, the formal otio of iformatio-theoretic security is itroduced ad the performace limits of geeral cryptosystems are established. The problem of compressig ecrypted data is formally stated i Sectio IV ad a solutio based o the Wyer-Ziv distributed source codig theorem [2] is preseted. Results from computer simulatios are preseted i Sectio V ad some cocludig remarks are give i Sectio VI. Ivolved proofs of the mai results have bee placed i appedices to maitai the flow of the presetatio. Notatio: R + deotes the set of oegative real umbers. Radom quatities will be deoted by capital letters (e.g., X). Specific realizatios of radom quatities will be deoted by small letters (e.g., x). Boldface letters will deote vectors of some geeric block legth, e.g., x := (x,x 2,...,x ), X := (X,X 2,...,X ), etc. Ofte, lim sup ad lim if shall be abbreviated to lim sup ad lim if respectively. We will deote the mathematical expectatio operator by E[ ] ad evet probabilities by P( ). II. DISTRIBUTED SOURCE CODING I this sectio, we describe the distributed source codig problem ad provide the priciples behid code costructios for both lossless compressio ad compressio with a fidelity criterio. These code costructios

5 5 will be used subsequetly to costruct systems that implemet the compressio of ecrypted data. A. Lossless compressio Distributed source codig cosiders the problem of compressig sources Y ad K that are correlated, but caot commuicate with each other. I this subsectio, we look at the case where Y ad K are to be compressed losslessly. This is possible oly if Y ad K are draw from discrete alphabets, i.e., the size of the alphabets is at most coutably ifiite. A importat special case of this problem, upo which we will focus, is whe Y eeds to be set to a decoder which has access to the correlated side-iformatio K. For this situatio, the Slepia-Wolf theorem [] gives the smallest achievable rate for commuicatig Y losslessly to the decoder. The Slepia-Wolf theorem asserts that the best achievable rate required to trasmit K is give by the coditioal etropy [4] of Y give K, deoted by H(Y K) bits/sample. While these results are theoretical, there has bee some recet work that provides practical code costructios to realize these distributed compressio gais [3]. We will use a example to show the ituitio behid these costructios. Y Ecoder Decoder Ŷ K Fig. 3. A distributed source codig problem: The side iformatio K is available at both the ecoder ad the decoder. We begi by lookig at the case where K is available at both the ecoder ad the decoder, as depicted i Figure 3. I our example, Y ad K are each uiformly distributed biary data of legth 3. Furthermore, Y ad K are correlated such that their Hammig distace is at most, i.e., they differ i at most oe of the three bit positios. For example, if Y is 00, the K will equally likely be oe of the four patters {00,0, 000,0}. The ecoder forms the error patter e = Y K. Because Y ad K differ i at most oe bit positio, the error patter e ca take o oly four possible values, amely {000,00,00,00}. These four values ca be idexed with two bits. That idex is trasmitted to the decoder, which looks up the error patter correspodig to the idex received from the

6 6 ecoder, ad the computes Y = e K. Y Ecoder Decoder Ŷ Coset (00) = Coset 2 (0) K 0 0 = 0 Coset 3 (0) 0 0 = 0 Coset 4 () 0 0 = 0 Fig. 4. A distributed source codig problem: Y ad K are three bit biary sequeces which differ by at most oe bit. K is available oly at the decoder. The ecoder ca compress Y to two bits by sedig the idex of the coset i which Y occurs. We ext cosider the case i Figure 4 where K is available at the decoder, but ot at the ecoder. Without K, the ecoder caot form the error patter e. However, it is still possible for the ecoder to compress Y to two bits ad the decoder to recostruct Y without error. The reaso behid this surprisig fact is that it is uecessary for the ecoder to sped ay bits to differetiate betwee Y = 000 ad Y =. The Hammig distace of 3 betwee these two codewords is sufficietly large to eable the decoder to correctly decode Y based o its access to K ad the kowledge that K is withi a Hammig distace of from Y. If the decoder kows Y to be either Y = 000 or Y =, it ca resolve this ambiguity by checkig which of the two is closer i Hammig distace to K, ad declarig that codeword to be Y. We observe that the set {000,} is a 3-bit repetitio code with a miimum distace of 3. Likewise, i additio to the set {000,}, we ca cosider the followig 3 sets: {00,0}, {00,0}, ad {00,0}. Each of these sets is composed of two codewords whose Hammig distace is 3. These sets are the cosets of the 3-bit repetitio code. While we typically use the set {000,} as the 3-bit repetitio code (0 is ecoded as 000, ad as ), it is clear that oe could just as easily have used ay of the other three cosets with the same performace. Also, these 4 sets cover the complete space of biary 3-tuples that Y ca assume. Thus, istead of describig Y by its 3-bit value, we ca istead ecode the coset i which Y occurs. There are 4 cosets,

7 7 so we eed oly 2 bits to idex the cosets. We ca compress Y to 2 bits, just as i the case where K was available at both the ecoder ad decoder. This simple code costructio ca be used to compress data that has bee ecrypted with a oe-time pad. I this problem, K is a biary pad that is used to ecrypt a 3-bit data sequece X, formig a ecrypted data sequece Y = X K. If X ca oly take o the values {000, 00, 00, 00}, the the Hammig distace betwee Y ad K is at most. We ca use this costructio to compress Y to 2 bits, ad a decoder which has access to K will be able to correctly decode Y. The decoder ca the recover the origial data X by computig X = Y K. This costructio ca be exteded beyod the simple example cosidered here. The space of all possible words is partitioed ito cosets, which are associated with the sydromes of the pricipal uderlyig chael code (the 3-bit repetitio code i the above example). The ecodig procedure is to compute the sydrome of Y with respect to the appropriate chael code ad trasmit this sydrome to the decoder. The choice of chael code depeds o the correlatio structure betwee Y ad K. If Y ad K are more correlated, the the required stregth of the code is less. I practice, we will use a much more complex chael code tha the simple repetitio code. The decodig procedure is to idetify the closest codeword to K i the coset associated with the trasmitted sydrome, ad declare that codeword to be Y. B. Compressio with a fidelity criterio The Wyer-Ziv theorem [2] exteds the Slepia-Wolf result to the case of lossy codig with a distortio measure. This theorem gives the best achievable rate-distortio pairs for the problem of codig with side iformatio. The theorem applies to both discrete ad cotiuous sources. However, the real lie is the atural alphabet for represetig may sigals of iterest, such as atural images. We are primarily iterested i the case where the source is a real umber ad a mea squared error distortio measure is used. We will provide a example that illustrates some of the ituitio behid the implemetatio of a ecoder/decoder pair for distributed source codig with a o-zero fidelity criterio. I this example, Y is uiformly distributed i the iterval [ 9δ 2, 9δ 2 ]. The side iformatio K is correlated with Y such that K Y < δ. The ecoder will first quatize Y to Ŷ with a scalar quatizer with step size δ, which we show i Figure 5. Clearly, the distace betwee Y ad Ŷ is bouded by Y Ŷ δ 2. We ca thik of the

8 8 A B C A B C A B C 4δ 3δ 2δ δ 0 δ 2δ 3δ 4δ Fig. 5. Composite quatizer: The scalar quatizer with step size δ ca be thought of as three iterleaved scalar quatizers with step size 3δ. quatizer as cosistig of three iterleaved quatizers (cosets), each of step size 3δ. I Figure 5 we have labeled the recostructio levels of the three quatizers as A, B, ad C, respectively. The ecoder, after quatizig Y, will ote the label of Ŷ ad sed this label to the decoder, which requires log 2(3) bits o average. The decoder has access to the label trasmitted by the ecoder ad the side iformatio K. We ca boud the distace betwee Ŷ ad K as Ŷ K Ŷ Y + Y K < δ 2 + δ = 3δ 2 () Because Ŷ ad K are withi a distace of 3δ 2 separated by 3δ, the decoder ca correctly fid of each other ad the recostructio levels with the same label are Ŷ by selectig the recostructio level with the label set by the ecoder that is closest to K. This ca be see i Figure 6, which shows oe realizatio of Y ad K. I this figure, the ecoder quatizes Y to Ŷ ad trasmits the label, a A, to the decoder. The decoder fids the recostructio level labeled A that is closest to K, which is i fact Ŷ. K Y Ŷ A B C A B C A B C 4δ 3δ 2δ δ 0 δ 2δ 3δ 4δ Fig. 6. Distributed lossy compressio example: The ecoder quatizes Y to Ŷ ad trasmits the label of Ŷ, a A. The decoder fids the recostructio level labeled A which is closest to the side iformatio K, which is equal to Ŷ. I this example, the ecoder has trasmitted oly log 2 (3) bits, ad the decoder ca correctly recostruct Ŷ, a estimate withi δ 2 of the source Y. I the absece of K at the decoder, the ecoder would have had to trasmit log 2 (9) bits i order to sed the idex of the quatized level. This shows that the presece of the side-iformatio

9 9 ca be used to reduce the required trasmissio rate for meetig a target distortio. Further, observe that if the decoder had merely used K as a estimate of Y, the by defiitio that estimate could have bee as far as δ from the source Y. Hece, the ecoder, by sedig the label of the quatized source, has reduced the maximum possible distortio at the decoder by a factor of two. It should be oted that i this example we have simply chose to use Ŷ as the best estimate of Y. I reality, the decoder ca use both Ŷ ad K to compute a optimal estimate of Y (usig the joit statistics of (Y,K)). We have omitted this step here, as our itetio was to highlight the gais that are achieved by trasmittig the label (coset membership iformatio) to the decoder. I our example, we have used a scalar quatizer ad the ecoder computed the label of the quatized source via a very simple idea of alteratig the levels with three labels. I practice, we ca achieve better performace by replacig both of these methods with more complex alteratives, such as ested liear codes. For example, the ecoder ca quatize a sequece of source samples with a trellis-coded quatizatio (TCQ) scheme [5]. The it ca fid the sydrome of the quatized sequece with respect to a trellis-coded modulatio (TCM) scheme [6] ad trasmit that sydrome. The correlatio structure betwee Y ad K govers the amout of redudacy that we require i these codes. Practical code costructios for the distributed source codig problem ca be foud i [3]. III. INFORMATION-THEORETIC SECURITY I this sectio we set up the problem of secure ad badwidth efficiet trasmissio of messages over chaels where a eavesdropper ca liste to the messages beig trasmitted. We formalize the otio of iformatio-theoretic security ad establish performace limits for key size, secrecy, ad compressibility for geeral cryptosystems. Figure 7 shows a geeral model of a secret-key cryptosystem. A (stochastic) message source takig values i a source alphabet X is ecoded ito a bitstream B i blocks X of suitable legth usig a cryptographic key T. The source alphabet ca be arbitrary, i.e., discrete or cotiuous, uless otherwise oted. For simplicity, we assume that the source sequece X i, i =,... is idepedet ad idetically distributed (i.i.d) with distributio p X (x) o alphabet X. Our results ca, i priciple, be exteded to more geeral situatios, e.g., for statioary ergodic sources. The key T is a radom variable takig values i a fiite alphabet T idepedet of the message source. The secret key T is kow to the decoder through a secure chael. The ecodig takes place through a rate-r (R < ) bits per source symbol (bits/symbol) ecodig fuctio e : X T {0,} R. The ecoded message bitstream

10 0 B of rate R bits/symbol is set to the decoder through a isecure public chael which is effectively oiseless. The ecodig operatio should be such that the decoder ca recover a estimate X of the source message i a recostructio alphabet X, to a acceptable degree of fidelity, usig B ad T. The decodig takes place through a decodig fuctio g : {0,} R T X. Defiitio 3. (Cryptosystem) A cryptosystem of rate R ad block legth is a triple (T,e,g ) cosistig of (i) a fiite secret-key alphabet T with a associated key distributio 2 (ii) a rate-r ecoder map e : X T {0,} R, ad (iii) a decoder map g : {0,} R T X. Eavesdropper Message source X Ecoder B R e Public chael Decoder g X T Secure chael Fig. 7. A geeral secret-key cryptosystem: A message source X of block legth is ecrypted to a bitstream B usig a secret key T available to the decoder through a secure chael. A eavesdropper has access to the bitstream B which is beig set over a public chael operatig at rate R bits per source symbol. The goal is to desig the system so that the decoder ca recover the message source to a acceptable fidelity while providig security agaist eavesdroppig ad beig efficiet about utilizig system resources such as the badwidth of the public chael ad the cardiality of the key alphabet. Associated with the source ad recostructio alphabets X, X is a per-symbol oegative distortio criterio d : X X R +. The distortio criterio for a pair of -legth sequeces belogig to X ad X respectively is take to be additive i the compoets, i.e., d (x, x) := i= d(x i, ˆx i ). The rate-distortio fuctio of the source is the miimum umber of bits/symbol eeded to idex recostructios of the source so that the expected The effects of chael oise, which ca be dealt with usig error-correctig chael codes, are ot cosidered to be part of the cryptosystem i this work. 2 We do ot explicitly iclude the key distributio as part of the defiitio of the cryptosystem because as will become clear i the sequel, good cryptosystems will have a uiform key distributio.

11 per-symbol distortio is o more tha D [4, Chapter 3]. We deote the rate-distortio fuctio of the message source by R X (D) bits/symbol. A eavesdropper has access to the public chael ad strives to recover iformatio about the message source from the ecoded bitstream B. The goal is to desig a ecoder ad a decoder such that a eavesdropper who has access to the public chael bitstream B, but ot the key T, lears as little as possible about the message source o the average. The idea is to provide secrecy agaist ciphertext-oly attacks. Associated with such a cryptosystem are several iter-related desig ad performace parameters of iterest that oe would like to optimize: ) a measure of secrecy agaist eavesdroppig discussed below, 2) the measure of the fidelity of the source recostructio at the decoder give by E 3) the umber bits per source symbol trasmitted over the public chael give by R, ad ( [d X, X )], 4) the umber of bits of radomess or ucertaity i the secret key as measured by the bits per source symbol eeded to idex the key. This is related to the cardiality of the key-alphabet T. A more radom key would impose, i geeral, a greater burde o the resources of the secure key-distributio chael. A good system provides maximum secrecy with maximum fidelity usig the least amout of system resources, i.e., the miimum umber of bits/symbol R ad the smallest key-alphabet ecessary. A. Notio of perfect secrecy I his 949 paper [7], Claude Shao provided the first rigorous statistical treatmet of secrecy. The idea is that a eavesdropper will lear othig at all about the message source if the ecoded bitstream is statistically idepedet of the source messages. A iformatio-theoretic measure of the extet of the correlatio betwee two radom quatities itroduced by Shao is their mutual iformatio [4, p. 8]. The larger the mutual iformatio, the greater is the correlatio. Mutual iformatio is oegative ad is zero if ad oly if the two associated radom quatities are statistically idepedet. Accordig to Shao, a cryptosystem has (Shao-sese) perfect secrecy if the ecoded bitstream B is statistically idepedet of the message source X (whe the secret key T is uavailable), i.e., if I(X; B) = 0. I [8] Wyer itroduced the followig defiitio of perfect secrecy that we shall be usig i this work:

12 2 Defiitio 3.2 (Measure of secrecy ad Wyer-sese perfect secrecy) A iformatio-theoretic measure of secrecy of a rate-r cryptosystem (T,e,g ) of block legth is give by I(X;B), where I( ; ) stads for mutual iformatio. A sequece of rate-r cryptosystems {(T,e,g )} N is said to have Wyer-sese perfect secrecy if lim sup I(X; B) = 0. We would like to poit out that this is weaker tha Shao s defiitio of perfect secrecy because the idepedece betwee the source messages ad the ecoded bitstream holds oly asymptotically as the block legth goes to ifiity. Shao s defiitio is oasymptotic, i.e., I(X; B) = 0 should hold for every. I [9] Maurer proposed aother asymptotic otio of perfect secrecy which is stroger tha Wyer s defiitio, but weaker tha Shao s. Accordig to this otio, a sequece of cryptosystems has (Maurer-sese) perfect secrecy if lim sup I(X;B) = 0. We do ot kow if our results will cotiue to hold uder this stroger otio of perfect secrecy. However, the techiques that have bee developed i [0] suggest that our results ca be stregtheed. Also see Remark 4.7. A iformatio-theoretic measure of the amout of ucertaity or radomess i the key is the compressibility of the key i bits per source symbol. This is govered by the etropy of the key per source symbol: H(T) [4, p. 3 ad Chapter 5] which represets the miimum umber of bits/symbol that would have to be supported by the secure key-distributio chael. It turs out that log 2 T H(T) with equality if ad oly if all the T values of the key are equally likely [4, Theorem 2.6.4, p. 27]. Thus key radomess directly impacts the cardiality of the key-alphabet eeded. The followig theorem reveals certai importat aspects of the trade-off betwee the various performace parameters of a cryptosystem that strives to achieve maximum secrecy with maximum efficiecy for a maximum tolerable expected distortio. It is a straightforward extesio of a similar result by Shao [7] that assumed lossless recovery (zero distortio) of the source at the decoder. The proof of the theorem is preseted i Appedix A ad applies to both discrete ad cotiuous alphabet sources. Theorem 3.3 For a sequece of rate-r cryptosystems {(T,e,g )} N where the key is draw idepedetly of ( the source, if lim sup I(X;B) = 0 ad lim sup E [d X, X )] D < the R X (D) R ad R X (D) lim if H(T) lim if log 2 T.

13 3 Thus, i ay cryptosystem that provides perfect secrecy (i the Shao, Wyer, or Maurer sese) with expected distortio D, the key-alphabet must grow with block legth at least as fast as 2 RX(D). Hece, there must be at least as may biary digits i the secret key as there are bits of iformatio i the compressed message source if the cryptosystem provides perfect secrecy (i the Shao, Wyer, or Maurer sese) with expected distortio less tha or equal to D. Ituitively it is clear that if the key is chose idepedetly of the message source ad the decoder is able to recostruct the source to withi a expected distortio D, the ecoded bitstream rate R caot be smaller tha R X (D): the smallest umber of bits eeded to recostruct the source with a expected distortio o more tha D. A cryptosystem is efficiet if it operates at a rate close to R X (D) bits/symbol, usig a key-alphabet whose size is close to 2 RX(D) ad achieves a expected distortio less tha or equal to D with almost perfect secrecy (i the Shao, Wyer, or Maurer sese). The questio of whether there exists a efficiet cryptosystem havig the smallest possible key-alphabet that provides perfect secrecy with maximum expected distortio D was also aswered by Shao for the case whe D = 0 ad ivolved the idea of separatig the performace requiremets ito two parts: (i) Efficiet utilizatio of system resources through optimal source compressio ad (ii) Ecryptio of the compressed bitstream with a Veram oe-time pad (a Beroulli( 2 ) bitstream). A slightly geeral versio of Shao s solutio ivolvig ozero distortio is show i Figure 8. Shao s system meets all the four desirable attributes of a cryptosystem discussed Eavesdropper Ecoder e Decoder g X bitstream C R D source B source ecoder + + Message R X (D) + ɛ XOR R X (D) + ɛ XOR C R D decoder X Secure chael T Uiform(T ), T = {0, } (R X(D)+ɛ ) Fig. 8. Shao cryptosystem: Shao s cryptosystem is efficiet ad achieves Shao-sese perfect secrecy with expected distortio D with the smallest key alphabet. earlier. Clearly the bitrate of the output bitstream is R = R X (D) + ɛ. The expected distortio betwee X ad

14 4 X is o more tha D because the decoder successfully recovers the rate-distortio compressed bitstream C. Sice T is assumed to be uiformly distributed over its alphabet i Figure 8, the etropy of the key (ad the size of the key-alphabet) i bits per source symbol is R X (D) + ɛ. Sice X ad T are idepedet, so are C ad T. Hece, P(B = b C = c) = P(T = b(xor)c C = c) = P(T = b(xor)c) = 2 (RX(D)+ɛ) which does ot deped o the value that C takes. Thus, the bitstreams B ad C are idepedet without the key T. Sice X C B form a Markov chai, by the data processig iequality 3, I(X;B) I(C;B) = 0, i.e., the cryptosystem achieves Shao-sese perfect secrecy for each. We would like to ote that i practice, the Veram oe-time pad would be simulated by a pseudo-radom sequece ad the seed of the pseudo-radom geerator would play the role of the key that is shared by the seder of messages ad the iteded recipiet. IV. COMPRESSION OF ENCRYPTED DATA As motivated i the itroductio, a iterestig questio that arises i the cotext of Shao s cryptosystem above is if it is possible to swap the operatios of ecryptio ad compressio i a way that the resultig system cotiues to fuctio as a good cryptosystem. To ecrypt the source data directly before ay compressio, we eed a otio of additio o a geeral alphabet X similar to the XOR operatio (modulo two additio) o biary data. Let X be edowed with a biary operator. The saliet properties of the XOR operatio o biary data that make thigs work are captured by the followig requiremets o the tuple (X, ) 4 : For all x,y,z X, (i) x y = y x, ad (ii) x z = y z x = y. Cosider the system show i Figure 9. I this system, the secret key-word K T is selected radomly from the secret-key codebook K X of size 2 R accordig to a uiform distributio idepedet of the source sequece X. Let T {0,} R be the radom variable (seed or key) which idicates which key-word was selected. Note that R log 2 X. This is directly added to the source sequece X to produce the ecrypted sequece Y = X K T where the additio is compoet-wise. Let B = i (Y) deote the ecoded message bitstream 3 This essetially states that successive stages of processig caot icrease the statistical correlatio betwee the processed data ad the raw data as measured by their mutual iformatio. Specifically, if three radom variables X, Y, ad Z form a Markov chai X Y Z the I(X; Z) I(Y ; Z) ad I(X; Z) I(X;Y ) [4, p. 32]. 4 A tuple (X, ) satisfyig these requiremets is called a commutative quasi-group whe X is a fiite set [].

15 5 Eavesdropper Ecoder e Ecryptio Compressio Message X Y source + i B R Decoder g Joit decryptio ad decodig g X K T K T Secret-key codebook K T Uiform(T ), T = {0, } R Secure chael Secret-key codebook K Fig. 9. Reversed cryptosystem: A cryptosystem where ecryptio precedes compressio. produced by the ecoder. The decoder produces the recostructio X = g (B,K T ). The average, per-compoet distortio is E(d (X, X)). The ecrypted sequece Y is compressed a la Wyer-Ziv (W-Z) [2] by exploitig the fact that the key-word, which is available to the decoder, is related to Y. This leads us to the followig defiitio. Defiitio 4. (Cryptographic Wyer-Ziv source code) A rate-(r,r) cryptographic Wyer-Ziv source code of block legth is a triple (K,i,g ) cosistig of (i) a secret-key codebook K X such that K = 2 R, (ii) a ecoder map i : X {0,} R, ad (iii) a decoder map g : {0,} R K X. As i geeral cryptosystems, a sequece of cryptographic W-Z source codes {(K,i,g )} N is said to have Wyer-sese perfect secrecy if lim sup I(X;B) = 0. Defiitio 4.2 The triplet (R,R,D) is said to be achievable with Wyer-sese perfect secrecy if there exists a sequece of rate-(r,r) cryptographic W-Z codes havig Wyer-sese perfect secrecy such that lim sup E [d (X,g (i (X K T ),K T ))] D The first parameter R i the triplet (R,R,D) represets the ecryptio efficiecy of the cryptosystem, i.e., the umber of bits of radomess i the key per source symbol which has direct bearig o the size of the key codebook. The secod parameter R represets the compressio efficiecy of the cryptosystem, i.e., the umber of bits of the output bitstream per symbol of the message source geerated by the cryptosystem. The followig theorem tells us what sort of ecryptio ad compressio rates, R (D) ad R(D) respectively, ca defiitely be achieved usig a

16 6 cryptosystem havig the structure of Figure 9 for a source recostructio quality D while beig able to achieve Wyer-sese perfect secrecy by usig progressively loger block legths for codig. The two corollaries followig the theorem show that it is possible to compress ecrypted data without ay loss of ecryptio or compressio efficiecy with respect to a system where compressio precedes ecryptio. These results costitute the mai theoretical cotributio of this work. Theorem 4.3 Let X ad K be draw idepedetly ad i.i.d with the (commo) distributio p X (x), Y := X K, ad R WZ (D) := if I(Y ;U K), (2) p U Y, f where U is a auxiliary radom variable takig values i a alphabet U ad the miimizatio is over all coditioal probability distributios p U Y, with (X,K) Y U formig a Markov chai, ad all fuctios f : X U X such that p X (x)p X (k)p U Y (u x k)d(x,f(k,u)) D. x,k,u The, (R WZ (D),R WZ (D),D) is achievable with Wyer-sese perfect secrecy. The proof of this theorem for fiite alphabets is preseted i Appedix B. The proof for cotiuous alphabets (e.g., Gaussia sources) ad ubouded distortio criteria (e.g., mea squared error) ca be established alog similar lies usig the techiques i [2], [3]. We would like to ote that there is o fudametal difficulty i carryig out this proof. The associated techical aspects are defiitely importat ad otrivial but oly detract from the mai cocepts uderlyig the proof. Theorem 4.3 tells us that the triple (R WZ (D),R WZ (D),D) is achievable with Wyer-sese perfect secrecy by cryptosystems havig the structure show i Figure 9 but are there better ecryptio ad compressio rates that ca be realized o these cryptosystems at the same distortio D while beig able to achieve Wyer-sese perfect secrecy? Remark 4.4 It ca be show that the achievable performace give by Theorem 4.3 is also the best possible for ay cryptosystem havig the structure show i Figure 9, i.e., ay system havig this structure eeds a rate of at least R WZ (D) bits per source symbol to achieve Wyer-sese perfect secrecy ad expected distortio D. The proof

17 7 (omitted here) is alog the lies of the proof of the optimality of W-Z distributed source codig i [2], [4]. For geeral distortio criteria ad source distributios the W-Z cryptosystems ca suffer from some loss of compressio efficiecy, i.e., R WZ (D) > R X (D), (but o loss of Wyer-sese perfect secrecy) with respect to the Shao-type cryptosystems. However, as discussed below, i two importat cases of iterest W-Z cryptosystems are efficiet. Corollary 4.5 (Zero distortio, i.e., lossless recovery of data) If X = X are coutable alphabets ad the distortio criterio satisfies d(x,x) = 0 x X, ad d(x, ˆx) > 0, x ˆx the (H(X),H(X),0) is achievable with Wyer-sese perfect secrecy. Furthermore, R = R = H(X) caot be improved upo by ay cryptosystem (ot ecessarily havig the structure of Figure 9) whe it is required that the message source be recovered losslessly, i.e., D = 0. Proof: The achievability ca be proved from theorem 4.3 alog the lies of Remark 3 i [2, pg. 3] where it is show that R WZ (0) = H(Y K) = H(X). Sice R X (0) = H(X) [4, Chapter 5], R = R = H(X) caot be improved for lossless recovery of the source as per Theorem 3.3. Corollary 4.6 (Gaussia sources) Whe X is Gaussia, i.e., X N(0,σ 2 ), X = X = R, ad the distortio criterio is squared-error, i.e., d(x, ˆx) = (x ˆx) 2, the (R X (D),R X (D),D), is achievable with Wyer-sese perfect secrecy by a W-Z cryptosystem for ay target distortio D. Hece, W-Z cryptosystems are optimal i every sese for Gaussia sources ad squared error distortio. Proof: Here, R X (D) = 2 log σ2 D, D σ2 is the rate-distortio fuctio of a Gaussia source with variace σ 2 [4, p. 344]. Achievability follows from Theorem 4.3 by choosig U = Y + Z, Z N(0,σZ 2 ), Z Y, ad f(k,u) = E(X K = k,u = u), where σ 2 Z is chose such that E ( (X f(k,u) 2) = D, i.e., σ 2 Z = σ2 D σ 2 D. With these choices it ca be show that, I(Y ;U K) = 2 σ2 log D. The optimality follows agai from Theorem 3.3. The above corollary shows that for Gaussia sources, cryptographic Wyer-Ziv systems are as efficiet as sourcecodig-followed-by-ecryptio systems i terms of compressio rate ad the requiremets o the secret key. Remark 4.7 For fiite alphabets, it is possible to guaratee the stroger otio of Shao-sese perfect secrecy for the system of Figure 9 if oe is willig to sacrifice key-efficiecy (measured by R ). Specifically, let the variable K i

18 8 Theorem 4.3 be distributed accordig to Uiform(X) istead of p X (x) ad let R WZ (D) deote the correspodig rate as i equatio (2). The (log 2 X, R WZ (D),D) is achievable with Shao-sese perfect secrecy. The proof of this result is alog the same lies as that of Theorem 4.3 (see Appedix B). The oly additioal coditio that eeds to be checked is if Shao-sese perfect secrecy is attaiable. This is verified by a argumet which parallels the oe for the Shao cryptosystem of Figure 8. Example: With referece to Figure 9, let = 3, X = X = K = T = {0,} 3 ad X Uiform({000,00, 00,00}). Hece, X is a correlated sequece of three bits where it is kow that at most oe bit of X is equal to oe. Clearly, R X (0) = H(X) = 2 bits, R = log 2 X =, ad K T is a Veram oe-time pad with K T uiformly distributed over {0,} 3. For the ecryptio system of Figure 9, Y = X(XOR)K T so that Y ad K T differ i at most oe out of their three bits. Hece, if the coset-codebook of Figure 4 is used for the compressio box i of Figure 9, idetifyig X ad S i Figure 4 respectively with Y ad K T, oly two bits (equal to H(X)) are eeded to represet B (the output of i ) eve though the compressio box does ot have access to the secret key K T. Here, B is the idex of the coset (i bits) to which Y belogs. The decoder g first recovers Y by fidig the 3-bit codeword i the coset idexed by B which is closest to the key K T available to it. Fially, X is recovered from Y ad K T as X = X = Y(XOR)K T. Hece, the compressio ad secrecy performace of this system matches that of the Shao cryptosystem of Figure 8 where X is first compressed to two bits ad the ecrypted with a Veram oe-time pad. However, the Shao system is more efficiet i terms of the legth of the Veram oe-time pad eeded. The Shao cryptosystem eeds a oe-time pad of legth two whereas the system of Figure 9 eeds a oe-time pad of legth three. So far we cosidered cryptosystems where we had cotrol over the desig of both the ecryptio ad the compressio compoets. A iterestig questio is how much compressio ca we achieve if the ecryptio scheme is pre-specified by some user. Let us look at this situatio i more detail for the case whe the source is required to be reproduced at the decoder losslessly. Let F T : X Y be a pre-desiged ecryptio map which is parameterized by a secret key T. We oly require that there be a correspodig decryptio map G T : Y X such that G T (F T (.)) is the idetity map. As before lets assume that the compoets of the message sequece X are i.i.d. with distributio p X (x). The pre-specified ecryptio box ca i geeral produce a output sequece Y whose

19 9 compoets are correlated across time. To compress such a sequece, oe would eed to exploit the depedece betwee the output ad the key that is available to the decoder. We kow how to do this for the case whe the output is i.i.d. by usig the Slepia-Wolf distributed source codig theorem []. The results of Slepia ad Wolf ca be geeralized to the case where the iput to the distributed compressio box has memory [4]. This would give us a ecodig-decodig scheme which would work at the etropy-rate of the uecrypted source, H(X), but still recover X with high probability for sufficietly large. But what happes to the secrecy performace if we cocateate a pre-specified ecryptio box (which outputs Y) with the geeralized Slepia-Wolf compressio box (which outputs B) that has bee tailored to provide optimal compressio performace? By the data processig iequality (cf. last footote of Sectio III) we have I(X;B) I(X;Y). Very ofte the iequality is strict. Thus, compressio will preserve, if ot ehace, the iformatio theoretic secrecy. V. COMPUTER SIMULATION RESULTS Up to this poit, our focus has bee o the theoretical aspects of the problem of compressig ecrypted data, i particular o the performace that ca be theoretically achieved. I this sectio, we cosider real systems that implemet the compressio of ecrypted data. We discuss the codes used to costruct such systems ad give computer simulatios of their compressio performace. We will describe systems for both lossless ad lossy compressio. A. Ecryptio ad distributed lossless compressio of bilevel images I the followig example, the bilevel image i Figure 0 is ecrypted ad the compressed. For the purpose of illustratio, this image is treated as a i.i.d. strigs of 0,000 biary digits (the image is of size pixels where filled pixels correspods to a oe ad ufilled pixels correspod to a zero) disregardig ay spatial correlatio or structure that is evidetly preset i such a atural image. Thus, for the purpose of this example, the source is ot a image but is represeted as such i order to aid the readers uderstadig, ad shall heceforth be referred to as a strig to highlight this fact. It is possible to desig distributed source codes that ca exploit the spatial correlatio structures i atural images, much like the Lempel-Ziv algorithm [5] ad its variats exploit

20 20 cotext iformatio for compressig files. However, this is beyod the scope of this work. The methods used i these examples were developed specifically i [6], but are strogly related to a sigificat body of work [7] [2]. Fig. 0. Bilevel image used i the computer simulatio: For the purpose of display, the bit is mapped to the gray-scale value 0 ad the bit 0 is mapped to the gray-scale value 255. Natural images, such as the cartoo show here, have cosiderable memory (correlatio) across spatial locatios as evideced by the presece of sigificat 2-D structure that is easily recogized by humas. For the purpose of simulatio though, the pixel values (take i the raster-sca order) are assumed to be i.i.d. Beroulli radom variables. The image has 706 ozero etries correspodig to a empirical first-order etropy of about H(X) = 0.37 bits/pixel. The strig that is depicted as a image i Figure 0 has 706 ozero etries correspodig to a empirical first-order etropy of about H(X) = 0.37 bits/pixel. The strig is ecrypted by addig a uique pseudo-radom Beroulli( 2 ) strig of the appropriate legth. The ecrypted strig has a empirical first-order etropy of about H(Y ) =.0 bit/pixel. A traditioal compressio approach, which treats the data as origiatig from a i.i.d. biary source, would cosider the ecrypted strig to be icompressible. The ecrypted strig is compressed by fidig its sydrome with respect to a rate- 2 LDPC chael code [6]. That is, a strig of legth is multiplied by a (,k) code s parity check matrix H of dimesio ( k) to obtai a output strig of legth ( k). Thus a (,k) LDPC code is used to compress a ecrypted strig to rate ( k)/. Via this multiplicatio, the ecrypted code space is broke ito cosets. These cosets cosist of all ecrypted strigs with the same sydrome with respect to the chose LDPC code, ad the cosets are idexed by that commo sydrome. By breakig the space ito cosets i this maer, we isure that i each coset there will

21 2 Fig.. Compressig ecrypted images, example: A image (at left) is first ecrypted by addig a Beroulli( 2 ) bit-sequece geerated by a pseudo-radom key to produce the secod image. The result is the compressed by a factor of two usig practical distributed source codes developed i [6] to produce the third compressed ad ecrypted image bitstream. For the purpose of display, the ecrypted ad compressed bitstream has bee arraged ito the rectagular shape show here. Fially, the compressed bits are simultaeously decompressed ad decrypted usig a iterative decodig algorithm provided i [6] to obtai the last image. The decoded image is idetical to the origial. be oly oe elemet which is joitly typical with the key. At the receiver, the compressed data is decoded with a DISCUS type decoder [3] by usig the key bit-sequece as side iformatio. The decoder makes use of the fact that the ecrypted source bit-sequece ad the key are correlated. That is, the key ca be see as a oisy versio of the ecrypted sequece. Uder this view the goal of decodig ca be see as fidig the earest codeword to the key residig withi the coset specified by the compressed ecrypted sequece. Kowledge of the correlatio betwee the ecrypted strig ad the key (which is equivalet to kowledge of the source statistics) ad the sydrome (bi-idex or coset-idex) of the ecoded data is exploited by a belief propagatio algorithm [22], [23] to recover exactly the ecrypted sequece. Belief propagatio is a iterative algorithm that operates over graphical models ad coverges upo the margial distributios for each of the ukow bits, from which the bits ca be estimated. The algorithm is exact over trees, but i practice performs quite well for sparsely loopy graphs such as LDPC codes. The istace of belief propagatio used is early idetical to that used for decodig stadard LDPC codes, but with some adaptatios. First, the check ode update rule is modified to icorporate the kowledge of the sydrome of the ecrypted word. Secod, iitial margial distributios of the ecrypted bits are obtaied based o the kowledge of the key ad its correlatio to the ecrypted strig. Fially, with kowledge of the key ad the ecrypted sequece the decryptio is a trivial matter ad is cosidered to be a part of the decodig process. Usig this algorithm, the strig i Figure is perfectly decoded i 3 iteratios.

22 22 Samples of the best estimate at each stage of the iterative algorithm are provided i Figure 2. Fig. 2. Covergece of decoded estimate: The best estimate of the image at the ed of the specified umber of iteratios at the decoder (cf. Figure ). Clearly, the iitial estimate is quite graiy, but coverges rapidly towards the solutio. B. Ecryptio ad distributed lossy compressio of real valued data I this sectio, we provide simulatios of the compressio of a ecrypted real-valued data source. I these experimets, the data was a i.i.d. Gaussia sequece with variace.0. The data was ecrypted with a stream cipher. A key sequece, of the same legth as the data sequece, was added to the data o a sample-by-sample basis. The key was a i.i.d. Gaussia sequece, idepedet of the data. Our simulatios show the compressio performace of the scheme as a fuctio of the variace of the key sequece. Clearly, a i.i.d. Gaussia sequece is ot a good model for real world sigals such as atural images. However, more complex models that icorporate Gaussia variables, such as cascades of Gaussia scale mixtures [24], have bee show to be good models of atural sigals. While this work focuses o the problem of compressig ecrypted data ad ot modelig of sigals, we believe that costructig codes for a i.i.d. Gaussia sequece is a iitial step toward developig a system that ca be used with a more complicated source. Our ecoder compresses the ecrypted data to a rate of bit/sample. I the first stage of the ecoder, each sample i the ecrypted data sequece is quatized with a scalar quatizer. We will provide simulatio results for three differet values of the step size of the scalar quatizer. The recostructio levels of the scalar quatizer are labeled

23 23 with umbers i the set {,2,3,4}, with the labels assiged to the recostructio levels i a cyclic maer. Each quatized sample is the replaced with the 2 bit biary represetatio of its label, resultig i a biary sequece that is twice as log as the origial real-valued data sequece. Fially, we fid the sydrome of this biary sequece with respect to a rate 2 trellis code [6]. The sydrome is the output of the ecoder, which is trasmitted to the decoder. I our simulatios, we used a 64 state trellis code i the ecoder. Sice we use a rate 2 code, the legth of the sydrome is half of the legth of the biary iput. Hece, the sydrome is a biary sequece of the same legth as the ecrypted data sequece. The ecrypted data has bee compressed by the scalar quatizer ad trellis code to the rate bit/sample. The decoder has access to the sydrome trasmitted by the ecoder, as well as the key sequece used i the stream cipher. The decoder cosiders the set of real-valued sequeces which take o values from the set of recostructio levels of the scalar quatizer. The decoder looks at the subset of such sequeces whose sydrome is the same as the sydrome set by the ecoder, ad the fids the sequece i that subset which is closest to the key sequece. At this poit, the decoder has two estimates of the ecrypted data sequece. It has the output of the trellis decoder ad it has the key sequece, which ca be thought of as a oisy versio of the ecrypted data where the oise is the origial, uecrypted data. The decoder combies these two estimates to form the optimal estimate of the ecrypted data. Fially, it subtracts the key sequece to obtai the optimal estimate of the origial data. Our simulatios measure the performace of our scheme by computig the distortio ad the probability of error i the trellis decoder as a fuctio of the variace of the key sequece. For each value of the key variace, we ra 500 trials, where each trial cosisted of a block of 2000 symbols. We preset plots of the mea squared error distortio i Figure 3(a) ad of the probability of error i the TCM decoder i Figure 3(b) versus the variace of the key sequece. O each plot there are three lies, which represet the performace for three differet scalar quatizer step sizes. The plots show that the distortio ad probability of error do ot chage as we chage the variace of the key. The performace of our ecoder/decoder pair depeds oly o the source, ot o the side iformatio. We ote that because the data has a variace of.0 ad we are compressig it to a rate of bit/sample, the miimum possible distortio is This result follows from stadard rate-distortio theory [4]. The distortios

24 Step size 3.5 Step size 4. Step size Step size 3.5 Step size 4. Step size Distortio Probability of Error Key Variace (db) Key Variace (db) (a) (b) Fig. 3. Compressio of ecrypted Gaussia data: A i.i.d. Gaussia data sequece, with variace.0, is ecrypted with a i.i.d. Gaussia key sequece, with variace as idicated by the horizotal axis, ad the compressed. The three lies idicate three differet quatizer step sizes used i the compressor. (a) Mea squared error distortio as a fuctio of key variace. (b) Probability of decodig error i the trellis as a fuctio of key variace. that we achieved for the various step sizes are i the rage of 0.5 to 0.6, which is about 3 to 3.8 db above the rate-distortio miimum. I these experimets, the bit error rate was i the rage of 0 3 to 0 4. The goal of these simulatios was to show that we ca compress the ecrypted data with the same efficiecy, regardless of the key sequece. I particular, the variace of the key sequece ca be chose as a fuctio of the security requiremets of the system, ad the compressio gai will ot be affected. The performace of our scheme depeds oly o the statistics of the source, ot the key. Our aim was ot to compress the ecrypted data to the boud provided by the Wyer-Ziv theorem, but to demostrate that icreasig the variace of the key sequece does ot affect the distortio or probability of decodig error. I order to compress the source to a distortio close to the boud, it would be ecessary to use a more powerful chael code i our scheme, such as the codes described i [25]. VI. CONCLUDING REMARKS I this work, we have examied the possibility of first ecryptig a data stream ad the compressig it, such that the compressor does ot have kowledge of the ecryptio key. The ecrypted data ca be compressed usig

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

Distribution of Random Samples & Limit theorems

Distribution of Random Samples & Limit theorems STAT/MATH 395 A - PROBABILITY II UW Witer Quarter 2017 Néhémy Lim Distributio of Radom Samples & Limit theorems 1 Distributio of i.i.d. Samples Motivatig example. Assume that the goal of a study is to

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Lecture 2: Monte Carlo Simulation

Lecture 2: Monte Carlo Simulation STAT/Q SCI 43: Itroductio to Resamplig ethods Sprig 27 Istructor: Ye-Chi Che Lecture 2: ote Carlo Simulatio 2 ote Carlo Itegratio Assume we wat to evaluate the followig itegratio: e x3 dx What ca we do?

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8 Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Advanced Stochastic Processes.

Advanced Stochastic Processes. Advaced Stochastic Processes. David Gamarik LECTURE 2 Radom variables ad measurable fuctios. Strog Law of Large Numbers (SLLN). Scary stuff cotiued... Outlie of Lecture Radom variables ad measurable fuctios.

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Stochastic Simulation

Stochastic Simulation Stochastic Simulatio 1 Itroductio Readig Assigmet: Read Chapter 1 of text. We shall itroduce may of the key issues to be discussed i this course via a couple of model problems. Model Problem 1 (Jackso

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula Joural of Multivariate Aalysis 102 (2011) 1315 1319 Cotets lists available at ScieceDirect Joural of Multivariate Aalysis joural homepage: www.elsevier.com/locate/jmva Superefficiet estimatio of the margials

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3

(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3 MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 18

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 18 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2013 Aat Sahai Lecture 18 Iferece Oe of the major uses of probability is to provide a systematic framework to perform iferece uder ucertaity. A

More information

4. Partial Sums and the Central Limit Theorem

4. Partial Sums and the Central Limit Theorem 1 of 10 7/16/2009 6:05 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 4. Partial Sums ad the Cetral Limit Theorem The cetral limit theorem ad the law of large umbers are the two fudametal theorems

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

MA131 - Analysis 1. Workbook 3 Sequences II

MA131 - Analysis 1. Workbook 3 Sequences II MA3 - Aalysis Workbook 3 Sequeces II Autum 2004 Cotets 2.8 Coverget Sequeces........................ 2.9 Algebra of Limits......................... 2 2.0 Further Useful Results........................

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

Chapter 6 Principles of Data Reduction

Chapter 6 Principles of Data Reduction Chapter 6 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 0 Chapter 6 Priciples of Data Reductio Sectio 6. Itroductio Goal: To summarize or reduce the data X, X,, X to get iformatio about a

More information

Random Variables, Sampling and Estimation

Random Variables, Sampling and Estimation Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig

More information

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1. Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio

More information

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1 EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

Entropy Rates and Asymptotic Equipartition

Entropy Rates and Asymptotic Equipartition Chapter 29 Etropy Rates ad Asymptotic Equipartitio Sectio 29. itroduces the etropy rate the asymptotic etropy per time-step of a stochastic process ad shows that it is well-defied; ad similarly for iformatio,

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

Report on Private Information Retrieval over Unsynchronized Databases

Report on Private Information Retrieval over Unsynchronized Databases Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio

More information

Discrete Mathematics for CS Spring 2008 David Wagner Note 22

Discrete Mathematics for CS Spring 2008 David Wagner Note 22 CS 70 Discrete Mathematics for CS Sprig 2008 David Wager Note 22 I.I.D. Radom Variables Estimatig the bias of a coi Questio: We wat to estimate the proportio p of Democrats i the US populatio, by takig

More information

Sets and Probabilistic Models

Sets and Probabilistic Models ets ad Probabilistic Models Berli Che Departmet of Computer ciece & Iformatio Egieerig Natioal Taiwa Normal Uiversity Referece: - D. P. Bertsekas, J. N. Tsitsiklis, Itroductio to Probability, ectios 1.1-1.2

More information

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio

More information

Statistics 511 Additional Materials

Statistics 511 Additional Materials Cofidece Itervals o mu Statistics 511 Additioal Materials This topic officially moves us from probability to statistics. We begi to discuss makig ifereces about the populatio. Oe way to differetiate probability

More information

1. Universal v.s. non-universal: know the source distribution or not.

1. Universal v.s. non-universal: know the source distribution or not. 28. Radom umber geerators Let s play the followig game: Give a stream of Ber( p) bits, with ukow p, we wat to tur them ito pure radom bits, i.e., idepedet fair coi flips Ber( / 2 ). Our goal is to fid

More information

( ) = p and P( i = b) = q.

( ) = p and P( i = b) = q. MATH 540 Radom Walks Part 1 A radom walk X is special stochastic process that measures the height (or value) of a particle that radomly moves upward or dowward certai fixed amouts o each uit icremet of

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

Refinement of Two Fundamental Tools in Information Theory

Refinement of Two Fundamental Tools in Information Theory Refiemet of Two Fudametal Tools i Iformatio Theory Raymod W. Yeug Istitute of Network Codig The Chiese Uiversity of Hog Kog Joit work with Siu Wai Ho ad Sergio Verdu Discotiuity of Shao s Iformatio Measures

More information

Random Matrices with Blocks of Intermediate Scale Strongly Correlated Band Matrices

Random Matrices with Blocks of Intermediate Scale Strongly Correlated Band Matrices Radom Matrices with Blocks of Itermediate Scale Strogly Correlated Bad Matrices Jiayi Tog Advisor: Dr. Todd Kemp May 30, 07 Departmet of Mathematics Uiversity of Califoria, Sa Diego Cotets Itroductio Notatio

More information

Feedback in Iterative Algorithms

Feedback in Iterative Algorithms Feedback i Iterative Algorithms Charles Byre (Charles Byre@uml.edu), Departmet of Mathematical Scieces, Uiversity of Massachusetts Lowell, Lowell, MA 01854 October 17, 2005 Abstract Whe the oegative system

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

Fall 2013 MTH431/531 Real analysis Section Notes

Fall 2013 MTH431/531 Real analysis Section Notes Fall 013 MTH431/531 Real aalysis Sectio 8.1-8. Notes Yi Su 013.11.1 1. Defiitio of uiform covergece. We look at a sequece of fuctios f (x) ad study the coverget property. Notice we have two parameters

More information

Statistical Pattern Recognition

Statistical Pattern Recognition Statistical Patter Recogitio Classificatio: No-Parametric Modelig Hamid R. Rabiee Jafar Muhammadi Sprig 2014 http://ce.sharif.edu/courses/92-93/2/ce725-2/ Ageda Parametric Modelig No-Parametric Modelig

More information

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n.

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n. Jauary 1, 2019 Resamplig Methods Motivatio We have so may estimators with the property θ θ d N 0, σ 2 We ca also write θ a N θ, σ 2 /, where a meas approximately distributed as Oce we have a cosistet estimator

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

The Growth of Functions. Theoretical Supplement

The Growth of Functions. Theoretical Supplement The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that

More information

CHAPTER I: Vector Spaces

CHAPTER I: Vector Spaces CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

7.1 Convergence of sequences of random variables

7.1 Convergence of sequences of random variables Chapter 7 Limit Theorems Throughout this sectio we will assume a probability space (, F, P), i which is defied a ifiite sequece of radom variables (X ) ad a radom variable X. The fact that for every ifiite

More information

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology Advaced Aalysis Mi Ya Departmet of Mathematics Hog Kog Uiversity of Sciece ad Techology September 3, 009 Cotets Limit ad Cotiuity 7 Limit of Sequece 8 Defiitio 8 Property 3 3 Ifiity ad Ifiitesimal 8 4

More information

Notes for Lecture 11

Notes for Lecture 11 U.C. Berkeley CS78: Computatioal Complexity Hadout N Professor Luca Trevisa 3/4/008 Notes for Lecture Eigevalues, Expasio, ad Radom Walks As usual by ow, let G = (V, E) be a udirected d-regular graph with

More information

Chapter 6 Sampling Distributions

Chapter 6 Sampling Distributions Chapter 6 Samplig Distributios 1 I most experimets, we have more tha oe measuremet for ay give variable, each measuremet beig associated with oe radomly selected a member of a populatio. Hece we eed to

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

As stated by Laplace, Probability is common sense reduced to calculation.

As stated by Laplace, Probability is common sense reduced to calculation. Note: Hadouts DO NOT replace the book. I most cases, they oly provide a guidelie o topics ad a ituitive feel. The math details will be covered i class, so it is importat to atted class ad also you MUST

More information

Seunghee Ye Ma 8: Week 5 Oct 28

Seunghee Ye Ma 8: Week 5 Oct 28 Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value

More information

6.867 Machine learning

6.867 Machine learning 6.867 Machie learig Mid-term exam October, ( poits) Your ame ad MIT ID: Problem We are iterested here i a particular -dimesioal liear regressio problem. The dataset correspodig to this problem has examples

More information

Probability, Expectation Value and Uncertainty

Probability, Expectation Value and Uncertainty Chapter 1 Probability, Expectatio Value ad Ucertaity We have see that the physically observable properties of a quatum system are represeted by Hermitea operators (also referred to as observables ) such

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

Lecture 3 The Lebesgue Integral

Lecture 3 The Lebesgue Integral Lecture 3: The Lebesgue Itegral 1 of 14 Course: Theory of Probability I Term: Fall 2013 Istructor: Gorda Zitkovic Lecture 3 The Lebesgue Itegral The costructio of the itegral Uless expressly specified

More information

Math 216A Notes, Week 5

Math 216A Notes, Week 5 Math 6A Notes, Week 5 Scribe: Ayastassia Sebolt Disclaimer: These otes are ot early as polished (ad quite possibly ot early as correct) as a published paper. Please use them at your ow risk.. Thresholds

More information

1 Introduction to reducing variance in Monte Carlo simulations

1 Introduction to reducing variance in Monte Carlo simulations Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE School of Computer ad Commuicatio Scieces Hadout Iformatio Theory ad Sigal Processig Compressio ad Quatizatio November 0, 207 Data compressio Notatio Give a set

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information