Layered Schemes for Large-Alphabet Secret Key Distribution

Size: px
Start display at page:

Download "Layered Schemes for Large-Alphabet Secret Key Distribution"

Transcription

1 Layered Schemes for Large-Alphabet Secret Key Distributio Hogchao Zhou Research Laboratory of Electroics Massachusetts Istitute of Techology Cambridge, MA 39 Ligog Wag Research Laboratory of Electroics Massachusetts Istitute of Techology Cambridge, MA 39 Gregory Worell Research Laboratory of Electroics Massachusetts Istitute of Techology Cambridge, MA 39 Abstract We discuss the desig of practical codes for largealphabet secret key distributio, motivated by the applicatio of high-dimesioal quatum key distributio. We itroduce ad study a simple scheme called layered scheme, which ca be treated as a variat of coded modulatio.the idea of layered schemes is to first split the observed large-alphabet symbols ito bit layers, ad to the ecode all the bit layers either idepedetly or joitly usig biary codes. The chaels that we are iterested i are more geeral tha the AWGN chaels or Rayleigh fadig chaels studied i coded modulatio. We preset ad compare differet implemetatios of layered schemes, i.e., based o idepedet parallel ecodig or joit ecodig, ad we ivestigate differet approaches i how to map large-alphabet symbols ito bit layers. Both theoretical aalyses ad simulatio results show that layered schemes have good performaces o q-ary chaels such as uiform-error chaels ad limited-magitude-error chaels. I. INTRODUCTION We cosider the problem of secret key distributio (SKD), which aims at establishig a secret key betwee two termials based o their correlated observatios [], [6]. Specifically, we try to desig efficiet codes for SKD whe the iitial observatios of the two parties are memoryless sequeces, with each symbol i the sequeces beig draw from a relatively large alphabet. Demads for such codes come from, e.g., practical high-dimesioal quatum key distributio (QKD) [] [], [7], []. To meet these demads, we itroduce a type of efficiet codig schemes which we call layered schemes. A. The Problem Cosider a sceario where two termials, Alice ad Bob, iitially observe sequeces X X ad Y Y, respectively. We assume that the eavesdropper, Eve, has o iitial kowledge about X or Y. The goal of SKD is to extract a secret key S {, } s betwee Alice ad Bob based o these observatios. The secret key S should be almost uiformly distributed o {, } s, ad should be almost completely ukow to Eve, i the sese of [], [6]. We assume that the sequeces X ad Y are both memoryless, with each pair (X, Y ) draw from the same joit distributio P XY. Without loss of geerality, let X = {,,..., q }. Fixig P X, We ca treat Y Y as the output after trasmittig X over a chael characterized by the trasitio law P C (Y X). As a example of the above settig, thik of the optical SKD problem discussed i [], []. A source geerates radom etagled-photo pairs which travel to Alice ad Bob separately, where some photos may be lost i trasmissio. Alice ad Bob record the detectio times of the photos, with precisio up to time-slots of a certai legth. They divide all the time-slots ito frames where each frame cotais q slots. Due to techical costraits, q is typically o the order of to. Through public discussio Alice ad Bob ca locate all the frames i which they each observed exactly oe photo. They ca use their relative detectio positios i these frames (i.e., X ad Y ) to distill the secret key. There ca be two types of errors i this example. First, due to trasmissio loss, Alice s ad Bob s detectios may come from differet photo pairs, which result i their detectio positios beig idepedet. Secod, due to detectio jitters, whe they detect photos from the same source pair, their detectio positios ca differ by oe or two slots. The chael from X to Y is the the result of combiig these two types of effects. Because of the high loss-rate ad low detectio-efficiecy i today s optical systems, the error probability of X Y ca be rather high, e.g, 5%, raisig challeges i code desig. A typical SKD protocol cosists of two steps. I the first step, ofte called iformatio recociliatio i cryptography, Alice ad Bob commuicate over a public chael (which is authetic but public to Eve). Based o the messages trasmitted ad o X ad Y, respectively, Alice geerates a sequece W {, } w ad Bob geerates a sequece W {, } w. I this step they try to make W = W with high probability, but Eve ca have some iformatio about W. I the secod step, privacy amplificatio [5] is applied to the sequece W ad W to extract the secret key S ad S. If W = W, the S = S. Furthermore, privacy amplificatio ca esure that Eve has virtually o iformatio about S. Sice there exist stadard techiques for privacy amplificatio, i this paper we focus o the first, iformatio-recociliatio step. We try to miimize the amout of iformatio that is leaked to Eve while esurig W = W with high probability. We defie the key rate of this step as r = P (W = W ) H(W W = W ) t, ()

2 where t is the umber of bits (correlated with W) commuicated betwee Alice ad Bob. This defiitio of the key rate is i the oasymptotic regime, ad is hece slightly differet from the existig defiitio i, e.g., [6], which focuses o the limit where teds to ifiity ad where the probability W = W teds to oe. I this limit, it ca be show usig results of [] that r teds to I(X; Y ). For fiite, we show i Appedix A that it always holds that r I(X; Y )+. We heceforth call I(X; Y ) the maximal key rate betwee X ad Y. B. Slepia-Wolf Codig A simple oe-way iformatio-recociliatio scheme directly applies a Slepia-Wolf [8] code. I this scheme, Alice seds a message R {, } t that is a determiistic fuctio of X to Bob; Bob the tries to recover the sequece X based o R ad Y. They use X as the commo sequece W. I [8], Slepia ad Wolf showed that the shortest legth of the biary message R that ca guaratee Bob s successful decodig of X is asymptotically equal to H(X Y). I practice, Slepia-Wolf codes are ofte costructed from liear chael codes. Specifically, let C be a liear code with a parity-check matrix H. I a correspodig Slepia-Wolf code, the message R set from Alice to Bob is the fully compressed versio of the sydrome of X, amely, of HX. It is easy to show that, if the code C ca correct the error Y X, the Bob ca retrieve X from Y ad R successfully. To implemet the above scheme requires efficiet liear q- ary codes, which are hard to fid or costruct for moderately large q. Oe cadidate is a Reed-Solomo code, but its blocklegth is limited by q ad it is iefficiet whe error probability is high. Aother cadidate is a large-alphabet LDPC code, which is more efficiet tha Reed-Solomo codes. However, traditioal belief-propagatio decodig is ot scalable to large alphabet size q for practical use [8], while verificatio-based decodig for LDPC codes, as of today, oly works for extremely large q [5]. C. Layered Schemes The mai idea of layered schemes for large-alphabet SKD is to covert the problem ito biary problems by mappig each symbol X X = {,,..., q } ito k = log q bits. Doig this, Alice splits the sequece X ito k bit layers. She the applies Slepia-Wolf codig to the k bit layers, either idepedetly or joitly, ad seds the ecoded bits to Bob. Layered schemes ca be see as the reverse of coded modulatio (see Fig. ), which was proposed to achieve both power ad badwidth efficiecies i commuicatio. I coded modulatio, the trasmitter first ecodes the message ito a biary codeword usig a error-correctio code, ad the maps the codeword to a sequece X with alphabet size X = k. Well-kow coded modulatio schemes iclude multilevel codig (MLC) [], [9] ad bit-iterleaved coded modulatio (BICM) [9]. These schemes have bee extesively studied for Gaussia chaels or Rayleigh fadig chaels, ad they ca be coverted to Slepia-Wolf codes for sources with biary message X Fig.. biary ECC mappig u coded modulatio layered scheme mappig v biary SW code Layered scheme ad coded modulatio. correspodig joit distributios. However, existig work o coded modulatio has ot cosidered geeral q-ary chaels or the specific optical settig discussed i Sectio I-A, ad the alphabet size q was costraied to be a power of (ot ecessary i layered schemes). Oe drawback of layered schemes (or of coded modulatio) is the high latecy. However, i cotrast to commuicatio, latecy is less importat i SKD. I SKD, Alice ad Bob usually geerate a secret-bit stream i a block-by-block way. These secret bits are stored for further use followig the well-kow oe-time-pad scheme [7]. Thaks to this cashig mechaism, eve if there is a loss or delay i some block i the key-distributio process, it will ot itroduce ay delay i the real-time data commuicatio uless the cashe is empty. Hece, while i commuicatio the decodig error rate of each block should be made extremely small to avoid retrasmissio (which will itroduce delay), i SKD we are more iterested i the statistical performace of differet blocks, i.e., the key rate that we defied i (). I some cases (Sectios III-C ad IV-C) our layered schemes ivolve iteractive commuicatio, i.e., they ivolve commuicatio from Bob to Alice. This ca simplify ad improve the performaces of the schemes. Iteractive commuicatio is ofte allowed ad widely used i SKD problems. But the kid of iteractive commuicatio we propose caot be used for chael codes, eve i the presece of feedback. The rest of this paper is orgaized as follows. Sectio II presets layered schemes ad their implemetatios based o idepedet ecodig ad joit ecodig. Sectio III compares two differet ecodig approaches of layered schemes. Sectio IV studies properties of layered schemes for certai classes of P C (Y X) ad ivestigates the role of iteractive commuicatio. Sectio V shows simulatio results ad demostrates that performaces of layered schemes ca be ear optimal. II. LAYERED SCHEMES As depicted i Fig., a layered scheme has two steps. I the first step, a ijective mappig u: X {, } k with k = log X is applied to map each symbol X i X to k bits (X, X,..., X k ). The sequece X is hece split ito k bit layers, heceforth deoted by X, X,..., X k, where X i with i k cotais the ith bit of u(x) for every X i X. I the secod step, Alice geerates a message R by applyig a biary Slepia-Wolf code to [X, X,..., X k ] ad seds R X R

3 X mappig X k R k SW ecoder E k X R SW ecoder E R the ext bit layer is.5. Hece the ext bit ca be treated as erased []. For the ith layer, it is coveiet to thik about the equivalet chael which takes iput X i ad outputs Y, X i. The trasitio law of this chael ca be easily obtaied as R k (a) Ecoder SW decoder D k X k P (Y = y, X i = x i X i = x i ) x A(x = P,x,...,x i) C(y x)p (X = x) x A(x P (X = x), i) R Y R R Fig.. SW decoder D SW decoder D (b) Decoder Idepedetly-Ecoded Layered Scheme. to Bob. After receivig R, Bob tries to recover every layer X, X,..., X k, ad hece also the origial sequece X, based o Y ad R. The sequece X is used as the commo sequece shared betwee Alice ad Bob (i.e., the sequece deoted W i the Itroductio), upo which privacy-amplificatio will be applied. I the secod step above, we cosider two differet approaches for Alice to apply a Slepia-Wolf code to [X, X,..., X k ]. The first approach is to apply a (possibly differet) Slepai-Wolf code to each bit layer idepedetly. Doig this will produce k output bit-strigs, the cocateatio of which is the message R. This approach is similar i spirit to MLC i chael codig. The secod approach is to apply a sigle biary Slepia-Wolf code to the whole vector [X, X,..., X k ], geeratig the message R directly. This approach is similar to BCIM i chael codig. We call the first approach a idepedetly-ecoded scheme, ad the secod approach a joitly-ecoded scheme. A. Idepedetly-Ecoded Scheme The diagram of the idepedetly-ecoded layered scheme is sketched i Fig.. I this scheme, Alice ecodes each bit layer X i with i k idepedetly based o biary Slepia-Wolf codig. As a result, she gets k messages deoted by R, R,..., R k, whose cocateatio R is set to Bob. Bob decodes each bit layer X i with i k based o the received message R i, his observatio Y, ad the decodig results of previous layers, i.e., Xi = [ X, X,..., X i ]. This is the multistage decodig for Slepia-Wolf codes. The idea behid this scheme is that the errors i differet bit layers (for the same symbol) are correlated. For istace, cosider the model where X is uiformly distributed o {,,..., q } with q = k for some iteger k, ad where P C (Y X) is a uiform-error chael (i.e., give Y X, Y takes value i the remaiig k symbols with equal probabilities). If a certai symbol erred i oe bit layer, the (irrespective of the mappig u) the probability that it errs i X X where A(x, x,..., x i ) deotes the set of all x X such that the jth bit of u(x) is x j with j i; similarly, A(x i ) deotes the set of all x X such that the ith bit of u(x) is x i. Theorem. Provided that a asymptotically optimal Slepia- Wolf code for each bit layer ca be foud, the maximum achievable asymptotic rate (i.e., the maximum rate i the limit where blocklegth teds to ifiity ad where the probability that W = W is required to ted to oe) of idepedetlyecoded layered schemes is r idepedet = I(X; Y ). Proof: Let t i be the legth of the message R i. From our defiitio () we have r =P (X = ˆX) H(X X = ˆX) k t i. Assume that the first i bit layers are successfully decoded. If the Slepia-Wolf code is asymptotically optimal for the equivalet chael i, the [8] lim t i H(X i Y, X i ) = ad, for ay positive ɛ, for large eough, P (X i X i ) < ɛ. Usig the chai rule for coditioal etropies we obtai t i lim = lim H(X i Y, X i ) H(X Y) = lim =H(X Y ), where the last step follows from our assumptio that the sequeces X ad Y are memoryless. We also have H(X) H(X (X k = ˆX k )) + P (X k = ˆX k )H(X X k = ˆX k ) + ɛk + H(X X k = ˆX k ) + ɛk +, so H(X X k = ˆX k ) H(X) ɛk. Hece, as, we have r ( ɛk) H(X) ɛk k t i =( ɛk)h(x) ɛk H(X Y ) =I(X; Y ) ɛk(h(x) + ).

4 X mappig X k X (a) Ecoder SW ecoder E R SW decoder D X Y Fig. 3. (b) Decoder Joitly-Ecoded Layered Scheme. Settig ɛ arbitrarily small proves the theorem. Theorem shows that the idepedetly-ecoded scheme is theoretically optimal, irrespective of the chose mappig u. B. Joitly-Ecoded Scheme I the joitly-ecoded layered scheme, as sketched i Fig. 3, Alice treats [X, X,..., X k ] as a whole biary sequece ad applies a sigle Slepia-Wolf code to this sequece. As a result, she gets the message R, which she seds to Bob. To decode [X, X,..., X k ] based o the received message R ad the observatio Y, Bob igores the depedece betwee the bits i [X, X,..., X k ]. For istace, for the Maximum Likelihood Decoder, Bob computes the likelihood of X i oly based o Y ad the idex i. For the ith layer, we ca thik of the equivalet chael which takes iput X i ad outputs Y. The trasitio law of this equivalet chael is x A(x P (Y = y X i = x i ) = P i) C(y x)p (X = x) x A(x P (X = x). i) Assume that the biary Slepia-Wolf code (as well as the decoder for each layer) is optimal, the the message legth t satisfies lim This implies the followig: t k H(X i Y) =. Theorem. Provided that a asymptotically optimal biary Slepia-Wolf code ca be foud, the maximum asymptotic rate of the joitly-ecoded layered scheme is r joit = H(X) H(X i Y ). Note that there is geerally a gap betwee rjoit ad ridepedet = I(X; Y ). This gap depeds o the distributio P XY ad o the mappig u: X {, } k. R C. Slepia-Wolf Codes based o LDPC codes We ext demostrate how to costruct a Slepia-Wolf code from a biary LDPC code. For a biary-iput chael with iput X ad output Y, we assume that C is a LDPC code with parity-check matrix H such that for all X C, X ca be successfully decoded from Y with probability close to oe. The ecodig of the Slepia-Wolf code based o C is very simple: the message R set from X to Y is the compressed versio of HX. Note that if we defie a coset code C R as C R = {X {, } : HX = R}, the X is a codeword i C R. Decodig Y ad R joitly to recover X is ow equivalet to decodig the coset code C R. Oe such decoder based o belief-propagatio is described i [], [3]. Specifically, we label the bits i R to the check odes, the the belief passed from a check ode c to a variable ode v is m cv = ( ) Rc tah v N(c)/v tah ( mv ) c, () where m vc is the message passed from a variable ode v to a check ode c, N(c) is the set of variable odes that coect to check ode c, ad R c is the bit labeled o the check ode c. Compared to the belief-propagatio decoder for the origial LDPC code, it oly chages the sigs of the beliefs from the check odes with R c =. D. Chael Adapters Slepia-Wolf codes based o LDPC codes have earoptimal performaces for biary-iput symmetric chaels with equiprobable iput distributio. Here, a biary-iput chael C : {, } Y is said to be symmetric if ad oly if there exists a bijective fuctio σ : Y Y such that σ (y) = y for all y Y ad P C (y x = ) = P C (σ(y) x = ) for all y Y. Ufortuately, the equivalet chaels yielded by layered schemes are ot always symmetric. I [], a tool called chael adapter was itroduced to force the symmetry of the biary-iput chaels for commuicatio. The same idea ca be used for Slepia-Wolf codig. Let X {, } be the biary sequece observed by Alice ad Y Y be the sequece observed by Bob. Alice draws a radom sequece Z uiformly from {, }, computes X = X Z, ad seds Z to Bob. We thus obtai a ew chael whose iput is X {, } ad whose output is (Y, Z) Y {, }. It is easy to see that P (X = ) = P (X = ). This ew chael is symmetric, because P C ((Y, Z) X = ) = P C (σ(y, Z) X = ) with σ(y, Z) = (Y, Z ) ad σ (Y, Z) = (Y, Z). If we costruct a Slepia-Wolf code based o LDPC codes for the sequeces X ad (Y, Z), the it has ear-optimal performace due to the symmetry of the ew chael. Hece

5 the legth of the message R set by Alice is close to H(X Y, Z). After successfully decodig X, Bob ca further retrieve X = X Z. Observig that H(X Y, Z) = H(X Z Y, Z) = H(X Y, Z) = H(X Y ), we coclude that: A Slepia-Wolf code for a arbitrary biary-iput chael that is based o chael adapters is asymptotically optimal if the uderlyig Slepia-Wolf code is asymptotically optimal for biary-iput symmetric chaels with equiprobable iput distributio. III. COMPARISON OF LAYERED SCHEMES I this sectio we itroduce differet mappigs u ad compare the two classes of layered schemes. A. Mappigs Let w : {,,..., k } {, } k be a bijective mappig. We cosider u which is w with the iput costraied o the first X values. The simplest mappig is the biary represetatio, i.e., the uique fuctio w bi : {,,..., k } {, } k such that w bi (x) = [x, x,..., x k ] with x = k x i i. Gray mappig, where two successive values i {,,..., k } differ i oly oe bit [6], is widely used i BICM [9]. We deote it as w Gray. Both the biary represetatio ad the Gray mappig are easy to costruct but geerally suboptimal i terms of rjoit. It is ofte computatioally difficult to fid the best mappig w by brute-force searchig. Oe idea is to first radomly geerate a bijective fuctio w, ad the to optimize w based o a heuristic approach. Specifically, we switch the outputs of w for two distict iput values a, b {,,..., k } if this operatio leads to a better mappig. We do this util o such two distict iput values ca be foud. We use w search to deote the mappig costructed i this way. As we shall see, this heuristic approach ca ofte lead to reasoably good mappigs. B. Maximal Key Rates We ext compare ridepedet ad rjoit, which are give i Theorems ad, respectively, where the latter depeds o the chose mappig u. A importat class of q-ary chael is uiform-error chaels. Such a chael s trasitio law P C (y x) with x, y {,,..., q } is give by { δ if y = x P C (y x) = δ q otherwise, where δ is the symbol error rate. I high-dimesioal QKD, this type of errors is usually caused by the dark curret, photo trasmissio ad detectio losses [3]. Aother iterestig class of chaels is local-error chaels. Local errors have also bee observed i QKD systems, ad are ofte caused by jitters of electroics [3]. A simple local-error chael is oe with trasitio law P C (y x) = δ if y x = ±, δ if x = y, otherwise (3) () maximal key rate maximal key rate Fig Idepedetly Ecoded Joitly Ecoded, w search Joitly Ecoded, w Gray Joitly Ecoded, w bi w search, w Gray, w bi alphabet size q (a) Uiform-Error Chael Idepedetly Ecoded Joitly Ecoded, w search Joitly Ecoded, w Gray Joitly Ecoded, w bi alphabet size q (b) Local-Error Chael Maximal key rates of the layered schemes for differet chaels. for all x, y {,,..., q }. Here, = q i the field of {,,,..., q }. Fig. compares the maximal rates of the two classes of (i.e., idepedetly-ecoded ad joitly-ecoded) layered schemes, with differet us, for the two chael models specified by (3) ad (), where we set the symbol error rate δ =.5 ad let X be uiformly distributed. It shows that the idepedetlyecoded scheme is much more efficiet tha the joitlyecoded scheme for chaels with a big fractio of uiform errors. We also observe that the Gray mappig w Gray is much better tha the biary represetatio w bi for the joitlyecoded scheme for local-error chaels. C. Error Propagatio I practice, our idepedetly-ecoded schemes ca suffer from error propagatio: a decodig error i a bit layer will result i decodig errors i the followig bit layers. To see this effect, let t i deote the legth of the message set from Alice to Bob for the ith bit layer, ad let e i deote the decodig error

6 probability of the ith bit layer whe the first i bit layers are successfully decoded. The key rate of the idepedetlyecoded scheme ca the be writte as ( k ) H(X) k r idepedet = ( e i ) t i. Usig iteractive commuicatio betwee Alice ad Bob, which is ofte allowed i iformatio recociliatio, ca help to largely elimiate error-propagatio effects. To this ed, after decodig the ith layer, Bob checks whether decodig was successful or ot. He ca do this either by observig the decodig process, i.e., whether the beliefs of all the variables coverge to certaity, or by Alice s addig extra redudat bits for error detectio. If there is a decodig error, the Bob asks Alice to trasmit the whole sequece X i directly. As a result, the key rate of the idepedetly-ecoded scheme is improved to r idepedet = [( e i ) H(X i X i ) t i H(X i X i ] ) H(X i ) + e i. D. Usig Suboptimal Biary Slepia-Wolf Codes Realistic Slepia-Wolf codes caot achieve the theoretical limit. We ext discuss how suboptimality of biary Slepia- Wolf codes affects the performace of the layered schemes. To simplify the discussio, we make a simple assumptio (which may ot be realistic): give a arbitrary biary-iput chael, the biary Slepia-Wolf code for X {, } ad Y Y requires αh(x Y) bits where α > for successful decodig. If the message legth is shorter tha αh(x Y), the X caot be recovered; otherwise, X ca be recovered surely. Based o this assumptio, we get the key rate of the joitlyecoded scheme: r joit = H(X) α H(X i Y ) H(X) αh(x Y ). We also get the key rate of the idepedetly-decoded scheme: r idepedet = H(X) mi(h(x i ), αh(x i X i, Y )) = H(X) αh(x Y ) + (αh(x i X i, Y ) H(X i )) +, where x + max{x, }. We see that r joit r idepedet, i.e., eve whe we use biary Slepia-Wolf codes that are suboptimal (but with the same performace for the two schemes), the idepedetlyecoded scheme is always better tha the joitly-ecoded scheme, irrespective of the mappig u. E. Discussios: Idepedet Ecodig vs. Joit Ecodig From the above aalyses, we have the followig simple observatios, which we shall further verify by simulatio i Sectio V. () If the magitude of errors is large, it is proe to apply the idepedetly-ecoded layered scheme rather tha the joitlyecoded layered scheme, for much higher maximal key rate. () Error propagatio amog differet bit layers is a problem for the idepedetly-ecoded scheme. However, this effect ca be elimiated by iteractive commuicatio betwee Alice ad Bob. (3) I high-speed SKD applicatios, hardware implemetatio of the uderlyig biary Slepia-Wolf decoders is required. Limited by hardware, the iput legth of the Slepia- Wolf code caot be too large. If we assume that the biary Slepia-Wolf codes used for the two layered schemes have the same iput legth ad approximately the same performace, the the overall performace of the joitlyecoded scheme should ot be better tha the idepedetlyecoded scheme. However, i this case, the block legth of the joitly-ecoded scheme is actually k times shorter tha that of the idepedetly-ecoded scheme. I other words, the idepedetly-ecoded scheme itroduces more latecy which, as we argued i the Itroductio, is less importat i SKD tha i commuicatios. () We will demostrate that i the idepedetly-ecoded scheme, iteractive commuicatio betwee Alice ad Bob ca further improve the practical performace of the scheme. I particular, Bob may sed some useful iformatio to Alice after decodig each bit layer, ad based o this iformatio Alice ca better ecode the ext layer. (5) As we have discussed may advatages of the idepedetly-ecoded scheme, it has a obvious disadvatage: it requires k biary Slepia-Wolf decoders, while the joitly-ecoded scheme requires oly oe decoder, which is less complex o hardware. IV. CHANNEL PROPERTIES I this sectio, we study some properties of certai chaels that are useful i layered schemes. A. Reflectio-Symmetric Chaels A chael C : X Y with X = {,,,.., q } for some eve q is said to be reflectio-symmetric if there exists a bijective fuctio σ : Y Y with σ = I such that P C (y x) = P C (σ(y) q x) for all x X, y Y. Examples of reflectio-symmetric chaels iclude the uiform-error chaels (3) ad the localerror chaels (). We show that if a q-ary chael is reflectio-symmetric with equiprobable iput distributio, the all the biary equivalet chaels yielded by the layered schemes are also symmetric (without chael adapters). Here, we cosider mappigs u: X {, } k satisfyig u(x) = u(q x) (5)

7 for all x X, where a [,,..., ] a. For istace, whe q = k, biary represetatio satisfies (5). Theorem 3. For a reflectio-symmetric chael with equiprobable iput distributio, if the mappig u satisfies (5), the the layered scheme based o u yield biary-iput symmetric chaels with equiprobable iput distributio for all layers. Proof: Let us cosider the equivalet chael i of the idepedetly-ecoded scheme. The chael s iput is X i ad its output is (X i, Y ). It is easy to see that the iput has equiprobable distributio, i.e., P (X i = ) = P (X i = ). We ca see that this chael is also symmetric. To this ed, observe P ((X i, Y ) X i = ) = P (Y x)p (x) = x A(X i,x i=) q x A(X i,x ) = P (X i, σ(y ) X i = ). P (σ(y ) q x)p (q x) Hece we obtai a bijective fuctio σ with σ (X i, Y ) = (X i, σ(y )) ad σ = I. So the equivalet chaels of the idepedetly-ecoded scheme are ideed symmetric. The proof for joitly-ecoded layered schemes are similar ad are omitted. B. Limited-Magitude-Error Chaels Give a chael C : X Y with Y = X = {,,,..., q }, we defie its error magitude as the miimal iteger m such that m = m + + m with P C (y x) =, y x < m or y x > m +. (6) For some chaels with limited-magitude errors, it is ot ecessary to split the sequece X ito k = log q bit layers. Istead, we ca geerate a ew sequece X such that X = X mod m +. The we apply a layered scheme to X ad Y. I this case, the umber of bit layers ca be reduced to log (m + ), ad the ecodig/decodig is simplified. The followig theorem shows that this simplificatio does ot degrade performace. Theorem. I the above approach, X ca be uiquely determied by X ad Y, ad H(X Y) = H(X Y). Proof: Let Z = Y X mod m +. If Z =, the X = Y. If < Z m +, the X = Y Z. If m + + Z m, the X = Y + Z m. So X ca be uiquely determied by X ad Y, ad H(X Y) = H(X, Y Y) = H(X Y). C. Cyclic-Symmetric Chaels A chael C : X Y with Y = X = {,,,.., q } is said to be cyclic-symmetric if for all x, y {,,..., q }, we have P C (y x) = P C (y x ). Here, we defie the operatio i the field of {,,..., q }, e.g., = q. Both the uiform-error chaels (3) ad local-error chaels () are cyclic-symmetric chaels. Theorem 5. For a cyclic-symmetric chael with q = k ad equiprobable iput distributio, let u be the biary represetatio i the lowest-bit-first order. If C = mi({i: X i Y i } {k + }), the I(X; C) =. Proof: We show that P (X = x, C = i) is idepedet of x as follows: P (X = x, C = i) = P C (y x)p (x) y : (y x)= i mod i = P C (y x ) k y : (y x)= i mod i = P C (e ) k. e X : e= i mod i The claim follows. The above theorem implies that for a cyclic-symmetric chael with q = k, if we apply a layered scheme with the biary-represetatio mappig, the Bob ca sed C to Alice without disclosig ay iformatio about X. We ca also write C as [C, C,..., C k ] with C i = (X i Y i ). So, istead of trasmittig C, Bob ca trasmit C, C,..., C k to Alice. We ca implemet this process i the idepedetlyecoded scheme, i.e, after decodig the ith bit layer, Bob seds C i to Alice. The followig example demostrates how such iteractive commuicatio ca be used to improve the practical performace of the idepedetly-ecoded scheme. Example 6. For a uiform-error chael specified by (3) with q = k, we have P (X i X i, Y, C i = ) =. It implies that if C i =, the Bob kows othig about X i util receivig the message R i. I this case, if Alice kows C i =, there is o eed for her to ecode X i ito the message R i. A simple approach is that Alice directly seds X i to Bob without ecodig it; she oly eeds to ecode those bits with C i =. I each bit layer, the bits to ecode is a radom variable upper-bouded by the block legth, which is ot coveiet for hardware decodig. Our idea of solvig this problem is to ecode bits from the same bit layer but differet blocks joitly. I the above example, assume that q = 3 ad that the biary Slepai-Wolf codig is ot perfect: it requires to trasmit

8 .H(X Y) bits to recover X. The, without applyig the iteractive-commuicatio mechaism, the maximal symbol error rate that allows o-zero key rate is δ =.6. By applyig the iteractive-commuicatio mechaism described i the example, the maximal symbol error rate that allows o-zero key rate is.883. V. SIMULATION I this sectio, we evaluate the performace of the layered schemes for large-alphabet secret key distributio by simulatio. We first itroduce the setup ad some practical implemetatio issues. The we provide some simulatio results for differet types of chaels. A. Setup I the simulatio, we set q = 3 with k = 5 ad let X be uiformly distributed o {,,..., 3}. The blocklegth for the idepedetly-ecoded scheme is = ad the the block legth for the joitly-ecoded scheme is 8 (for the same legth of the uderlyig biary Slepia-Wolf codes). We assume that each biary Slepia-Wolf code associates with extra d = parity-check bits so that the decodig error ca be detected by Bob with high probability. We use simple regular LDPC codes for the biary Slepia- Wolf codig. Specifically, give the block legth ad message legth r, the parity-check matrix H is radomly costructed such that each colum has exactly 3 oes. (Note that by usig irregular LDPC codes based o desity evolutio, we ca get better performaces of the layered schemes.) I the idepedetly-ecoded scheme, we use the biaryrepresetatio with the lowest-bit-first order as the mappig u, ad we let t i be the message legth of the biary Slepia- Wolf code for the ith bit layer. The the rate of the scheme (elimiatig the error-propagatio effect based o iteractive commuicatio) is r idepedet = 5 ( e i (t i )) max( t i d, ) with =, where e i (t i ) is the decodig error probability for the ith bit layer ad it is a fixed fuctio of t i with give chael ad Slepia-wolf code. I the joitly-ecoded scheme, we use the Gray mappig as the mappig u, ad we let t be the message legth of the biary Slepia-Wolf code. The the rate of the scheme is r joit = ( e(t)) max( t d, ) /k with =, where e(r) is the decodig error probability. B. Message Legth Accordig to the expressios of the key rates, the message legth t i (or t) for each biary Slepia-Wolf code ca be optimized idepedetly. For istace, the optimal legth t i for the equivalet chael i i the idepedetly-ecoded scheme is t i = arg max t i ( e i (t i )) max( t i d, ). Key Rate Theoretical Limit Joitly Ecoded Limit Idepedetly Ecoded, Iteractive Idepedetly Ecoded Joitly Ecoded Reed Solomo Symbol Error Rate δ Fig. 5. Key rates of the layered schemes based o regular LDPC codes for uiform-error chaels whe q = 3 ad =. The block legth of the Reed-Solomo code is. Such a way of selectig t i is very useful whe symbol error rate is high. For istace, assume that it requires t i > to make e i (t i )., ad it requires t i =.9 to make e i (t i ) =.5. Obviously, the secod t i results i a higher key rate. I the simulatio, we igore this edge effect of t i (i.e., whe symbol error rate is high, the optimal message legth should be used). We use a simple empirical approach to determie t, t,..., t k ad t. Specifically, we let t i = α i H(X Y) with α i > whe X ad Y are the iput sequece ad output sequece of the equivalet chael i, respectively. At the begiig, we let α i =. We apply the biary Slepia- Wolf codig to may samples of X ad Y. If X caot be successfully decoded, the we update α i = α i + α c with a small costat α c, e.g... By ruig this procedure for eough samples, e.g., samples, we obtai a reasoably good message legth t i, based o which a biary Slepia-Wolf code is costructed as the basic compoet for the layered schemes. C. Uiform-Error Chaels Fig. 5 shows the performaces of the layered schemes for the uiform-error chaels defied by (3). Due to the imperfectess of the regular LDPC codes that we used, there is a gap betwee the actual key rates of the layered schemes ad their maximal key rates. We compare the layered schemes with Slepia-Wolf codes based o Reed-Solomo codes. We cosider a Reed-Solomo code over F (q) with block legth = q m. For such a code, i order to correct at most t symbol errors, it requires r = mt redudat symbols. Give a symbol error rate δ, we ca select the best t to maximize the key rate. I this case, the maximal

9 Key Rate Key Rate Theoretical Limit Joitly Ecoded Limit Idepedetly Ecoded Joitly Ecoded.5.5 Theoretical Limit Joitly Ecoded Limit Idepedetly Ecoded Joitly Ecoded Symbol Error Rate δ Symbol Error Rate δ Fig. 6. Key rates of the layered schemes based o regular LDPC codes for local-error chaels whe q = 3 ad =. Fig. 7. Key rates of the layered schemes based o regular LDPC codes for hybrid-error chaels whe q = 3 ad =. key rate is r RS = max t,m P ( E t)[k(q m tm) d] q m, where P ( E t) is the probability that the umber of erroeous symbols is at most t. I this simulatio, we have k = 5 ad we set m =. From Fig. 5, we see that there is a sigificat performace gai i the layered schemes over Reed-Solomo codes, especially whe the symbol error rate is ot small. We also see that the idepedetly-ecoded scheme is much more efficiet tha the joitly-ecoded scheme for correctig uiform errors. This possibly comes from the gap betwee the maximal key rates of the two schemes. Furthermore, iteractive commuicatio improves the performace of the idepedetly-ecoded scheme. Our ituitio is that, as the symbol error rate icreases, the improvemet becomes stroger because there are more bits that ca be treated as erased i the scheme. D. Local-Error Chaels Fig. 6 shows the performaces of the layered schemes for local-error chaels described by (). There is a smaller gap betwee the performaces of the joitly-ecoded scheme ad of the idepedetly-ecoded scheme compared to o uiform-error chaels. Oe observatio is that, as the symbol error rate icreases, the gap betwee their maximal key rates icreases. Aother observatio is that the gap of the actual key rate ad the maximal key rate of the joitly-ecoded scheme is larger tha that of the idepedetly schemes. We ca explai the secod observatio as follows. The key rate of the idepedetly-ecoded scheme ca be roughly writte as k α(h(x i X i, Y )) (7) for a cocave fuctio α( ). It meas that, i practice, if H(X i Y ) is small, the biary Slepia-Wolf code eeds a large overhead. I the ideal case, α(x) = x. Similarly, the key rate of the joitly-ecoded scheme ca be roughly writte as ( ( k )) k α H(X i Y ). (8) k The differece betwee (7) ad (8) comes from two terms, α(h(x i Y )) α(h(x i X i, Y )) itroduced by the gap of the maximal key rates, ad ( k ) kα H(X i Y ) α(h(x i Y )) k itroduced by the cocavity of the fuctio α( ). This is a advatage of the idepedet-ecoded scheme over the joitlyecoded scheme i practical use. E. Hybrid-Error Chaels I the high-dimesioal QKD systems described i [3], [], a large umber of uiform errors ad local errors due to differet mechaisms are observed. We call such a chael a hybrid-error chael. Fig. 7 simulates a hybrid-error chael C : {,,..., q } {,,..., q } described by P C (y x) = δ if y x = ±, δ if x = y, δ (q 3) otherwise. We see that, eve if all the symbols have errors, the idepedetly-ecoded scheme is still able to geerate secret bits.

10 Key Rate Theoretical Limit Joitly Ecoded Limit Idepedetly Ecoded Joitly Ecoded We the obtai r =P (W = W ) H(W W = W ) t P (W = W ) I(X; Y W = W ) I(X; Y (W=W )) I(X; Y ) +. This completes the proof Symbol Error Rate δ Fig. 8. Key rates of the layered schemes based o regular LDPC codes for discrete-gaussia-error chaels whe q = 3 ad =. F. Discrete-Gaussia-Error Chaels Fig. 8 shows the performaces of the layered schemes for a discrete chael with Gaussia oise, ad we call it a discrete- Gaussia-error chael, defied by y x P C (y x) = δ e σ c x x= e σ for all x, y {,,..., q }, x y. Here c = is a ormalizatio factor ad δ is the symbol error rate. I this simulatio, we choose σ = 3. APPENDIX A UPPER BOUND ON THE KEY RATE Theorem 7. Let r be the key rate defied i (), the, for ay >, r I(X; Y ) +. Proof: Let T {, } t be the set of bits that are commuicated betwee Alice ad Bob ad are correlated with W. Note that W ca be uiquely determied by X ad T, ad that W ca be uiquely determied by Y ad T. First, we derive a upper boud o H(W W = W ) t as follows: H(W W = W ) t H(W W = W, T) = H(XW W = W, T) H(X W, W = W, T) H(X W = W, T) H(X Y, W, W = W, T) = H(X W = W, T) H(X Y, W = W, T) = I(X; Y W = W, T) Followig the proof of Theorem i [6], specifically Eq. (3) therei, we have I(X; Y W = W, T) I(X; Y W = W ). REFERENCES [] R. Ahlswede ad I. Csiszár, Commo radomess i iformatio theory ad cryptography Part I: Secret sharig, IEEE Tras. If. Theory, vol. 39, pp. 3, Jul [] I. Ali-Kha ad J. C. Howell, Experimetal demostratio of high twophoto time-eergy etaglemet, Phys. Rev. A, vol. 73, 38(R) (6). [3] I. Ali-Kha, C. J. Broadbet, ad J. C. Howell, Large-alphabet quatum key distributio usig eergy-time etagled bipartite states, Phys. Rev. Lett. vol. 98, 653 (7). [] J. T. Barreiro, N. K. Lagford, N. A. Peters, ad P. G. Kwiat, Geeratio of hyperetagled photo pairs, Phys. Rev. Lett. vol. 95, 65 (5). [5] C. H. Beett, G. Brassard, C. Crepeau, ad U. M. Maurer, Geeralized privacy amplificatio, IEEE Tras. If. Theory, vol., o. 6, pp , 995. [6] J. R. Biter, G. Ehrlich ad E. M. Reigold, Efficiet geeratio of the biary reflected gray code ad its applicatios, Commuicatios of the ACM, vol. 9, pp. 57 5, 976. [7] N. J. Cerf, M. Boureace, A. Karlsso, ad N. Gisi, Security of quatum key distributio usig d-level systems, Phys. Rev. Lett., vol. 88, 79 (). [8] M. C. Davey ad D. MacKay, Low desity parity check codes over GF(q), IEEE Commu. Lett., vol., pp , 998. [9] G. Caire, G. Taricco, ad E. Biglieri, Bit-iterleaved coded modulatio, IEEE Tras. Iform. Theory, vol., pp , 998. [] M. N. O Sulliva-Hale, I. Ali-Kha, R. W. Boyd, ad J. C. Howell, Pixel etaglemet: experimetal realizatio of optically etagled d=3 ad d=6 qudits, Phys. Rev. Lett., vo. 9, 5 (5). [] J. Hou, P. H. Siegel, L. B. Milstei ad H. D. Pfister, Capacityapproachig badwidth-efficiet coded modulatio schemes based o low-desity parity-check codes, IEEE Tras. Iform. Theory, vol. 9, pp. 55, 3. [] H. Imai ad S. Hirakawa, A ew multilevel codig method usig error correctig codes, IEEE Tras. Iform. Theory, vol. 3, pp , 977. [3] A. Kav cić, X. Ma, ad M. Mitzeamcher, Biary itersymbol iterferece chaels: Gallager codes, desity evolutio, ad code performace bouds, IEEE Tras. Iform. Theory, vol. 9, pp , 3. [] Y. Kochma ad G.W. Worell, O high-efficiecy optical commuicatio ad key distributio i Proc. Iformatio Theory ad Applicatio Workshop, February. [5] M. G. Luby ad M. Mitzemacher, Verificatio-based decodig for packet-based low-desity parity-check codes, IEEE Tras. Iform. Theory, vol. 5, o., pp. 7, 5. [6] U. M. Maurer, Secret key agreemet by public discussio from commo iformatio, IEEE Tras. Ifo. Theory, vol. 39, pp , 993. [7] C. E. Shao, Commuicatio theory of secrecy systems, Bell Syst. Tech. J. vol. 8, pp , 99. [8] D. Slepia ad J. K. Wolf, Noiseless codig of correlated iformatio sources, IEEE Tras. Ifo. Theory, vol. 9, pp. 7 8, 973. [9] U. Wachsma, R. F. H. Fischer, ad J. B. Huber, Multilevel codes: Theoretical cocepts ad practical desig rules, IEEE Tras. Iform. Theory, vol. 5, pp , 999. [] C. Weidma, Codig for the q-ary symmetric chael with moderate q, i Proc. IEEE It. Symp. Iformatio Theory (ISIT), pp , July 8.

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8 Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n.

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n. Jauary 1, 2019 Resamplig Methods Motivatio We have so may estimators with the property θ θ d N 0, σ 2 We ca also write θ a N θ, σ 2 /, where a meas approximately distributed as Oce we have a cosistet estimator

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 12

Machine Learning Theory Tübingen University, WS 2016/2017 Lecture 12 Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract I this lecture we derive risk bouds for kerel methods. We will start by showig that Soft Margi kerel SVM correspods to miimizig

More information

Lecture 9: Hierarchy Theorems

Lecture 9: Hierarchy Theorems IAS/PCMI Summer Sessio 2000 Clay Mathematics Udergraduate Program Basic Course o Computatioal Complexity Lecture 9: Hierarchy Theorems David Mix Barrigto ad Alexis Maciel July 27, 2000 Most of this lecture

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

ECE 8527: Introduction to Machine Learning and Pattern Recognition Midterm # 1. Vaishali Amin Fall, 2015

ECE 8527: Introduction to Machine Learning and Pattern Recognition Midterm # 1. Vaishali Amin Fall, 2015 ECE 8527: Itroductio to Machie Learig ad Patter Recogitio Midterm # 1 Vaishali Ami Fall, 2015 tue39624@temple.edu Problem No. 1: Cosider a two-class discrete distributio problem: ω 1 :{[0,0], [2,0], [2,2],

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

A Partial Decode-Forward Scheme For A Network with N relays

A Partial Decode-Forward Scheme For A Network with N relays A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

Reliability and Queueing

Reliability and Queueing Copyright 999 Uiversity of Califoria Reliability ad Queueig by David G. Messerschmitt Supplemetary sectio for Uderstadig Networked Applicatios: A First Course, Morga Kaufma, 999. Copyright otice: Permissio

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit 08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1 EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum

More information

Inequalities for Entropies of Sets of Subsets of Random Variables

Inequalities for Entropies of Sets of Subsets of Random Variables Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Rank Modulation with Multiplicity

Rank Modulation with Multiplicity Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 ajiag@cse.tamu.edu Abstract Rak modulatio is a scheme that uses the relative order

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

A New Achievability Scheme for the Relay Channel

A New Achievability Scheme for the Relay Channel A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Arithmetic Distribution Matching

Arithmetic Distribution Matching Arithmetic Distributio Matchig Sebastia Baur ad Georg Böcherer Istitute for Commuicatios Egieerig Techische Uiversität Müche, Germay Email: baursebastia@mytum.de,georg.boecherer@tum.de arxiv:48.393v [cs.it]

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

Recurrence Relations

Recurrence Relations Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

Stochastic Simulation

Stochastic Simulation Stochastic Simulatio 1 Itroductio Readig Assigmet: Read Chapter 1 of text. We shall itroduce may of the key issues to be discussed i this course via a couple of model problems. Model Problem 1 (Jackso

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Lecture 2: Monte Carlo Simulation

Lecture 2: Monte Carlo Simulation STAT/Q SCI 43: Itroductio to Resamplig ethods Sprig 27 Istructor: Ye-Chi Che Lecture 2: ote Carlo Simulatio 2 ote Carlo Itegratio Assume we wat to evaluate the followig itegratio: e x3 dx What ca we do?

More information

Nonuniform Codes for Correcting Asymmetric Errors

Nonuniform Codes for Correcting Asymmetric Errors 2011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Nouiform Codes for Correctig Asymmetric Errors Hogchao Zhou Electrical Egieerig Departmet Califoria Istitute of Techology Pasadea, CA 91125

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

SOME THEORY AND PRACTICE OF STATISTICS by Howard G. Tucker

SOME THEORY AND PRACTICE OF STATISTICS by Howard G. Tucker SOME THEORY AND PRACTICE OF STATISTICS by Howard G. Tucker CHAPTER 9. POINT ESTIMATION 9. Covergece i Probability. The bases of poit estimatio have already bee laid out i previous chapters. I chapter 5

More information

4. Partial Sums and the Central Limit Theorem

4. Partial Sums and the Central Limit Theorem 1 of 10 7/16/2009 6:05 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 4. Partial Sums ad the Cetral Limit Theorem The cetral limit theorem ad the law of large umbers are the two fudametal theorems

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Discrete Mathematics for CS Spring 2008 David Wagner Note 22

Discrete Mathematics for CS Spring 2008 David Wagner Note 22 CS 70 Discrete Mathematics for CS Sprig 2008 David Wager Note 22 I.I.D. Radom Variables Estimatig the bias of a coi Questio: We wat to estimate the proportio p of Democrats i the US populatio, by takig

More information

Fixed-Threshold Polar Codes

Fixed-Threshold Polar Codes Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge

More information

Resilient Source Coding

Resilient Source Coding Resiliet Source Codig Maël Le Treust Laboratoire des Sigaux et Systèmes CNRS - Supélec - Uiv. Paris Sud 11 91191, Gif-sur-Yvette, Frace Email: mael.letreust@lss.supelec.fr Samso Lasaulce Laboratoire des

More information

Time-Domain Representations of LTI Systems

Time-Domain Representations of LTI Systems 2.1 Itroductio Objectives: 1. Impulse resposes of LTI systems 2. Liear costat-coefficiets differetial or differece equatios of LTI systems 3. Bloc diagram represetatios of LTI systems 4. State-variable

More information

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016 subcaptiofot+=small,labelformat=pares,labelsep=space,skip=6pt,list=0,hypcap=0 subcaptio ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, /6/06. Self-cojugate Partitios Recall that, give a partitio λ, we may

More information

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 18

Discrete Mathematics and Probability Theory Spring 2013 Anant Sahai Lecture 18 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2013 Aat Sahai Lecture 18 Iferece Oe of the major uses of probability is to provide a systematic framework to perform iferece uder ucertaity. A

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

MATH 320: Probability and Statistics 9. Estimation and Testing of Parameters. Readings: Pruim, Chapter 4

MATH 320: Probability and Statistics 9. Estimation and Testing of Parameters. Readings: Pruim, Chapter 4 MATH 30: Probability ad Statistics 9. Estimatio ad Testig of Parameters Estimatio ad Testig of Parameters We have bee dealig situatios i which we have full kowledge of the distributio of a radom variable.

More information

ELEC1200: A System View of Communications: from Signals to Packets Lecture 3

ELEC1200: A System View of Communications: from Signals to Packets Lecture 3 ELEC2: A System View of Commuicatios: from Sigals to Packets Lecture 3 Commuicatio chaels Discrete time Chael Modelig the chael Liear Time Ivariat Systems Step Respose Respose to sigle bit Respose to geeral

More information

Application to Random Graphs

Application to Random Graphs A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let

More information

On the Linear Complexity of Feedback Registers

On the Linear Complexity of Feedback Registers O the Liear Complexity of Feedback Registers A. H. Cha M. Goresky A. Klapper Northeaster Uiversity Abstract I this paper, we study sequeces geerated by arbitrary feedback registers (ot ecessarily feedback

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

Distribution of Random Samples & Limit theorems

Distribution of Random Samples & Limit theorems STAT/MATH 395 A - PROBABILITY II UW Witer Quarter 2017 Néhémy Lim Distributio of Radom Samples & Limit theorems 1 Distributio of i.i.d. Samples Motivatig example. Assume that the goal of a study is to

More information

10-701/ Machine Learning Mid-term Exam Solution

10-701/ Machine Learning Mid-term Exam Solution 0-70/5-78 Machie Learig Mid-term Exam Solutio Your Name: Your Adrew ID: True or False (Give oe setece explaatio) (20%). (F) For a cotiuous radom variable x ad its probability distributio fuctio p(x), it

More information

Interactive Encoding and Decoding Based on. Binary LDPC Codes with Syndrome Accumulation

Interactive Encoding and Decoding Based on. Binary LDPC Codes with Syndrome Accumulation Iteractive Ecodig ad Decodig Based o Biary LDPC Codes with Sydrome Accumulatio Ji Meg ad E-hui Yag arxiv:0.567v [cs.it] 5 Ja 0 This work was supported i part by the Natural Scieces ad Egieerig Research

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 5 STATISTICS II. Mea ad stadard error of sample data. Biomial distributio. Normal distributio 4. Samplig 5. Cofidece itervals

More information

4.3 Growth Rates of Solutions to Recurrences

4.3 Growth Rates of Solutions to Recurrences 4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.

More information

Lecture 7: October 18, 2017

Lecture 7: October 18, 2017 Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Lecture 23: Minimal sufficiency

Lecture 23: Minimal sufficiency Lecture 23: Miimal sufficiecy Maximal reductio without loss of iformatio There are may sufficiet statistics for a give problem. I fact, X (the whole data set) is sufficiet. If T is a sufficiet statistic

More information

Element sampling: Part 2

Element sampling: Part 2 Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig

More information

New Results in Coding and Communication Theory. Communication Systems Laboratory. Rick Wesel

New Results in Coding and Communication Theory. Communication Systems Laboratory.  Rick Wesel New Results i Codig ad Commuicatio Theory http://www.ee.ucla.edu/~csl/ Rick Wesel At the Aerospace Corporatio August, 008 Miguel Griot Bike ie Yua-Mao Chag Tom Courtade Jiadog Wag Recet Results A more

More information

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.

More information

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu

More information