# Information Theory (cs.IT)

• Covert communication can prevent the opponent from knowing that a wireless communication has occurred. In the additive white Gaussian noise channels, if we only take the ambient noise into account, a square root law was obtained and the result shows that Alice can reliably and covertly transmit $\mathcal{O}(\sqrt{n})$ bits to Bob in $n$ channel uses. If additional "friendly" node closest to the adversary can produce artificial noise to aid in hiding the communication, the covert throughput can be improved. In this paper, we consider the covert communication in noisy wireless networks, where potential transmitters form a stationary Poisson point process. Alice wishes to communicate covertly to Bob without being detected by the warden Willie. In this scenario, Bob and Willie not only experience the ambient noise, but also the aggregated interference simultaneously. Although the random interference sources are not in collusion with Alice and Bob, our results show that uncertainty in noise and interference experienced by Willie is beneficial to Alice. When the distance between Alice and Willie $d_{a,w}=\omega(n^{\delta/4})$ ($\delta=2/\alpha$ is stability exponent), Alice can reliably and covertly transmit $\mathcal{O}(\log_2\sqrt{n})$ bits to Bob in $n$ channel uses, and there is no limitation on the transmit power of transmitters. Although the covert throughout is lower than the square root law and the friendly jamming scheme, the spatial throughout of the network is higher, and Alice does not presuppose to know the location of Willie. From the network perspective, the communications are hidden in the noisy wireless networks, and what Willie sees is merely a "\emphshadow" wireless network where he knows for certain some nodes are transmitting, but he cannot catch anyone red-handed.
• We consider a wireless network in which $K$ transmitters, each equipped with a single antenna, fully cooperate to serve $K$ single antenna receivers, each equipped with a cache memory. The transmitters have access to partial knowledge of the channel state information. For a symmetric setting, in terms of channel strength levels, partial channel knowledge levels and cache sizes, we characterize the generalized degrees of freedom (GDoF) up to a constant multiplicative factor. The achievability scheme exploits the interplay between spatial multiplexing gains and coded-multicasting gain. On the other hand, a cut-set argument in conjunction with a new application of the aligned image sets approach are used to derive the outer bound. We further show that the characterized order-optimal GDoF is also attained in a decentralized setting, where no coordination is required for content placement in the caches.
• An important ingredient of the future 5G systems will be Ultra-Reliable Low-Latency Communication (URLLC). A way to offer URLLC without intervention in the baseband/PHY layer design is to use \emphinterface diversity and integrate multiple communication interfaces, each interface based on a different technology. Our approach is to use coding to seamlessly distribute coded payload and redundancy data across multiple available communication interfaces. We formulate an optimization problem to find the payload allocation weights that maximize the reliability at specific target latency values. By considering different scenarios, we find that optimized strategies can significantly outperform $k$-out-of-$n$ strategies, where the latter do not account for the characteristics of the different interfaces. Our approach is supported by experimental results.
• We present two new nonlinearity tolerant modulation formats at spectral efficiencies lower than 4bits/4D-symbol, obtained using a simplified bit-to-symbol mapping approach to set-partition PDM-QPSK in 8 dimensions.
• We consider a two-way updating system with a master node and a slave node. In each block, the master node transfers energy and updates to the slave node alternatively. The slave node performs transmission to the master node if it has sufficient energy for current block, i.e., using best-effort policy. Moreover, the slave node generates a new update immediately after the completion of previous update. We examine the freshness of the updates received by the master node in terms of \textitage of information (AoI), which is defined as the time elapsed after the generation of the latest received update. We derive average uplink AoI and uplink update rate as functions of downlink update rate in closed form. The obtained results illustrate the performance limit of the unilaterally powered two-way updating system in terms of timeliness and efficiency. The results also specify the achievable tradeoff between the update rates of the two-way updating system.
• Wireless fading channels suffer from both channel fadings and Additive White Gaussian Noise (AWGN). As a result, it is impossible for fading channels to support a constant rate data stream without using buffers. In this paper, we consider information transmission over an infinite-buffer-aided block Rayleigh fading channel in the low signal-to-noise ratio (SNR) regime. We characterize the transmission capability of the channel in terms of stationary queue length distribution, packet delay, as well as data rate. Based on the memoryless property of the service provided by the channel in each block, we formulate the transmission process as a discrete time discrete state $D/G/1$ queueing problem. The obtained results provide a full characterization of block Rayleigh fading channels and can be extended to the finite-buffer-aided transmissions.
• In this letter, we propose an enhanced Access Reservation Protocol (ARP) with a partial preamble transmission (PPT) mechanism for the narrow band Internet of Things (NB-IoT) systems. The proposed ARP can enhance the ARP performance by mitigating the occurrence of preamble collisions, while being compatible with the conventional NB-IoT ARP. We provide an analytical model that captures the performance of the proposed ARP in terms of false alarm, mis-detection and collision probabilities. Moreover, we investigate a trade-off between the mis-detection and the collision probabilities, and optimize the proposed ARP according to the system loads. The results show that the proposed ARP outperforms the conventional NB-IoT ARP, in particular at heavier system loads.
• Secure and reliable transmission over communication channels is first characterized by Wyner's wiretap channel (WTC) model. In recent years, the WTC with noiseless feedback (WTC-NF) attracts a lot attention, and it has been shown that the legal receiver's feedback enlarges the secrecy capacity of the WTC. Even so, the current feedback strategy for the WTC mainly focuses on generating key used for encrypting the transmitted message, and this strategy does not achieve the secrecy capacity of the WTC-NF. In this paper, a new coding strategy for the WTC-NF is presented. Besides used for generating key, the legal receiver's feedback of this new strategy is also used to produced a help information which helps the legal receiver to ameliorate his decoding performance. For the WTC-NF, the proposed new feedback strategy is shown to be better than the already existing one, and a binary example is given to further explain these results.

gae Jul 26 2017 21:19 UTC

For those interested in the literature on teleportation simulation of quantum channels, a detailed and *comprehensive* review is provided in Supplementary Note 8 of https://images.nature.com/original/nature-assets/ncomms/2017/170426/ncomms15043/extref/ncomms15043-s1.pdf
The note describes well the t

...(continued)
Stefano Pirandola May 05 2017 05:45 UTC

Today I have seen on the arXiv the version 2 of this paper on quantum reading. I am sorry to say that this revision still misses to acknowledge important contributions from previous works, especially in relation to the methods on channel simulation and teleportation that are crucial for its claims.

...(continued)
Samad Khabbazi Oskouei Sep 05 2016 11:34 UTC

I think that we have missed the "semi-" at the conclusion. Because, the proof of the theorem 4.3 is based on the using universal semi-density matrix concept which is not computable. The semi-computability concept used here is like the Kolmogorov complexity which is not computable and so the Cubic co

...(continued)
Toby Cubitt Sep 01 2016 11:14 UTC

I could well be missing something. But as far as I could tell from a rather quick read through the paper, all they show is that the quantum capacity of a channel with computable matrix elements is given by the regularised coherent information optimised over input ensembles with computable matrix ele

...(continued)
Māris Ozols Aug 30 2016 17:52 UTC

Do I understand correctly that this paper claims to show that quantum capacity is computable?

> After defining the algorithmic quantum capacity we have proved that it
> equals the standard one. Furthermore we have shown that it is
> computable.

Richard Kueng Jul 28 2015 07:01 UTC

fyi: our quantum implications are presented in Subsection 2.2 (pp 7-9).

Marco Tomamichel May 31 2015 22:07 UTC

Thanks for the comment! This is a good idea, I will do that in the next arXiv version.

Patrick Hayden May 28 2015 17:31 UTC

Wonderful! I've been waiting for a book like this for a while now! Thanks, Marco.

I do have one trivial comment from a 30 second preliminary scan, though: please consider typesetting the proofs with a font size matching the main text. If us readers are already squinting hard trying to understand

...(continued)
Marco Tomamichel Apr 02 2015 03:21 UTC

This is a preliminary version and I am happy to incorporate feedback I receive in the coming month. Any comments are welcome.