-
About the Rankin and Bergé-Martinet Constants from a Coding Theory View Point
Authors:
Frédérique Oggier,
Shengwei Liu,
Hongwei Liu
Abstract:
The Rankin constant $γ_{n,l}$ measures the largest volume of the densest sublattice of rank $l$ of a lattice $Λ\in \RR^n$ over all such lattices of rank $n$. The Bergé-Martinet constant $γ'_{n,l}$ is a variation that takes into account the dual lattice. Exact values and bounds for both constants are mostly open in general. We consider the case of lattices built from linear codes, and look at bound…
▽ More
The Rankin constant $γ_{n,l}$ measures the largest volume of the densest sublattice of rank $l$ of a lattice $Λ\in \RR^n$ over all such lattices of rank $n$. The Bergé-Martinet constant $γ'_{n,l}$ is a variation that takes into account the dual lattice. Exact values and bounds for both constants are mostly open in general. We consider the case of lattices built from linear codes, and look at bounds on $γ_{n,l}$ and $γ'_{n,l}$. In particular, we revisit known results for $n=3,4,5,8$ and give lower and upper bounds for the open cases $γ_{5,2},γ_{7,2}$ and $γ'_{5,2},γ'_{7,2}$.
△ Less
Submitted 14 January, 2025;
originally announced January 2025.
-
Constructions of non-Generalized Reed-Solomon MDS codes
Authors:
Shengwei Liu,
Hongwei Liu,
Frederique Oggier
Abstract:
Generalized Reed-Solomon codes form the most prominent class of maximum distance separable (MDS) codes, codes that are optimal in the sense that their minimum distance cannot be improved for a given length and code size. The study of codes that are MDS yet not generalized Reed-Solomon codes, called non-generalized Reed-Solomon MDS codes, started with the work by Roth and Lemple (1989), where the f…
▽ More
Generalized Reed-Solomon codes form the most prominent class of maximum distance separable (MDS) codes, codes that are optimal in the sense that their minimum distance cannot be improved for a given length and code size. The study of codes that are MDS yet not generalized Reed-Solomon codes, called non-generalized Reed-Solomon MDS codes, started with the work by Roth and Lemple (1989), where the first examples where exhibited. It then gained traction thanks to the work by Beelen (2017), who introduced twisted Reed-Solomon codes, and showed that families of such codes are non-generalized Reed-Solomon MDS codes. Finding non-generalized Reed-Solomon MDS codes is naturally motivated by the classification of MDS codes.
In this paper, we provide a generic construction of MDS codes, yielding infinitely many examples. We then explicit families of non-generalized Reed-Solomon MDS codes. Finally we position some of the proposed codes with respect to generalized twisted Reed-Solomon codes, and provide new view points on this family of codes.
△ Less
Submitted 11 December, 2024;
originally announced December 2024.
-
A Modular Framework for Centrality and Clustering in Complex Networks
Authors:
Frederique Oggier,
Silivanxay Phetsouvanh,
Anwitaman Datta
Abstract:
The structure of many complex networks includes edge directionality and weights on top of their topology. Network analysis that can seamlessly consider combination of these properties are desirable. In this paper, we study two important such network analysis techniques, namely, centrality and clustering. An information-flow based model is adopted for clustering, which itself builds upon an informa…
▽ More
The structure of many complex networks includes edge directionality and weights on top of their topology. Network analysis that can seamlessly consider combination of these properties are desirable. In this paper, we study two important such network analysis techniques, namely, centrality and clustering. An information-flow based model is adopted for clustering, which itself builds upon an information theoretic measure for computing centrality. Our principal contributions include a generalized model of Markov entropic centrality with the flexibility to tune the importance of node degrees, edge weights and directions, with a closed-form asymptotic analysis. It leads to a novel two-stage graph clustering algorithm. The centrality analysis helps reason about the suitability of our approach to cluster a given graph, and determine `query' nodes, around which to explore local community structures, leading to an agglomerative clustering mechanism. The entropic centrality computations are amortized by our clustering algorithm, making it computationally efficient: compared to prior approaches using Markov entropic centrality for clustering, our experiments demonstrate multiple orders of magnitude of speed-up. Our clustering algorithm naturally inherits the flexibility to accommodate edge directionality, as well as different interpretations and interplay between edge weights and node degrees. Overall, this paper thus not only makes significant theoretical and conceptual contributions, but also translates the findings into artifacts of practical relevance, yielding new, effective and scalable centrality computations and graph clustering algorithms, whose efficacy has been validated through extensive benchmarking experiments.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Coding Constructions for Efficient Oblivious Transfer from Noisy Channels
Authors:
Frédérique Oggier,
Gilles Zémor
Abstract:
We consider oblivious transfer protocols performed over binary symmetric channels in a malicious setting where parties will actively cheat if they can. We provide constructions purely based on coding theory that achieve an explicit positive rate, the essential ingredient being the existence of linear codes whose Schur products are asymptotically good.
We consider oblivious transfer protocols performed over binary symmetric channels in a malicious setting where parties will actively cheat if they can. We provide constructions purely based on coding theory that achieve an explicit positive rate, the essential ingredient being the existence of linear codes whose Schur products are asymptotically good.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
A Quadratic Form Approach to Construction A of Lattices over Cyclic Algebras
Authors:
Grégory Berhuy,
Frédérique Oggier
Abstract:
We propose a construction of lattices from (skew-) polynomial codes, by endowing quotients of some ideals in both number fields and cyclic algebras with a suitable trace form. We give criteria for unimodularity. This yields integral and unimodular lattices with a multiplicative structure. Examples are provided.
We propose a construction of lattices from (skew-) polynomial codes, by endowing quotients of some ideals in both number fields and cyclic algebras with a suitable trace form. We give criteria for unimodularity. This yields integral and unimodular lattices with a multiplicative structure. Examples are provided.
△ Less
Submitted 3 April, 2020;
originally announced April 2020.
-
Performance of Lattice Coset Codes on Universal Software Radio Peripherals
Authors:
Jinlong Lu,
J. Harshan,
Frédérique Oggier
Abstract:
We consider an experimental setup of three USRPs that implement a wiretap channel, two USRPs are the legitimate players Alice and Bob, while the third USRP is the eavesdropper, whose position we vary to evaluate information leakage. The experimented channels are close to slow fading channels, and coset coding of lattice constellations is used for transmission, allowing to introduce controlled rand…
▽ More
We consider an experimental setup of three USRPs that implement a wiretap channel, two USRPs are the legitimate players Alice and Bob, while the third USRP is the eavesdropper, whose position we vary to evaluate information leakage. The experimented channels are close to slow fading channels, and coset coding of lattice constellations is used for transmission, allowing to introduce controlled randomness at the transmitter. Simulation and measurement results show to which extent coset coding can provide confidentiality, as a function of Eve's position, and the amount of randomness used.
△ Less
Submitted 13 January, 2017; v1 submitted 25 July, 2016;
originally announced July 2016.
-
Modular Lattices from a Variation of Construction A over Number Fields
Authors:
Xiaolu Hou,
Frédérique Oggier
Abstract:
We consider a variation of Construction A of lattices from linear codes based on two classes of number fields, totally real and CM Galois number fields. We propose a generic construction with explicit generator and Gram matrices, then focus on modular and unimodular lattices, obtained in the particular cases of totally real, respectively, imaginary, quadratic fields. Our motivation comes from codi…
▽ More
We consider a variation of Construction A of lattices from linear codes based on two classes of number fields, totally real and CM Galois number fields. We propose a generic construction with explicit generator and Gram matrices, then focus on modular and unimodular lattices, obtained in the particular cases of totally real, respectively, imaginary, quadratic fields. Our motivation comes from coding theory, thus some relevant properties of modular lattices, such as minimal norm, theta series, kissing number and secrecy gain are analyzed. Interesting lattices are exhibited.
△ Less
Submitted 6 April, 2016;
originally announced April 2016.
-
On skew polynomial codes and lattices from quotients of cyclic division algebras
Authors:
Jérôme Ducoat,
Frédérique Oggier
Abstract:
We propose a variation of Construction A of lattices from linear codes defined using the quotient $Λ/\mathfrak pΛ$ of some order $Λ$ inside a cyclic division $F$-algebra, for $\mathfrak p$ a prime ideal of a number field $F$. To obtain codes over this quotient, we first give an isomorphism between $Λ/\mathfrak pΛ$ and a ring of skew polynomials. We then discuss definitions and basic properties of…
▽ More
We propose a variation of Construction A of lattices from linear codes defined using the quotient $Λ/\mathfrak pΛ$ of some order $Λ$ inside a cyclic division $F$-algebra, for $\mathfrak p$ a prime ideal of a number field $F$. To obtain codes over this quotient, we first give an isomorphism between $Λ/\mathfrak pΛ$ and a ring of skew polynomials. We then discuss definitions and basic properties of skew polynomial codes, which are needed for Construction A, but also explore further properties of the dual of such codes. We conclude by providing an application to space-time coding, which is the original motivation to consider cyclic division $F$-algebras as a starting point for this variation of Construction A.
△ Less
Submitted 19 June, 2015;
originally announced June 2015.
-
On Group Violations of Inequalities in five Subgroups
Authors:
Nadya Markin,
Eldho K. Thomas,
Frederique Oggier
Abstract:
We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten gr…
▽ More
We consider ten linear rank inequalities, which always hold for ranks of vector subspaces, and look at them as group inequalities. We prove that groups of order pq, for p,q two distinct primes, always satisfy these ten group inequalities. We give partial results for groups of order $p^2q$, and find that the symmetric group $S_4$ is the smallest group that yield violations, for two among the ten group inequalities.
△ Less
Submitted 18 March, 2015;
originally announced April 2015.
-
Compressed Differential Erasure Codes for Efficient Archival of Versioned Data
Authors:
J. Harshan,
Anwitaman Datta,
Frédérique Oggier
Abstract:
In this paper, we study the problem of storing an archive of versioned data in a reliable and efficient manner in distributed storage systems. We propose a new storage technique called differential erasure coding (DEC) where the differences (deltas) between subsequent versions are stored rather than the whole objects, akin to a typical delta encoding technique. However, unlike delta encoding techn…
▽ More
In this paper, we study the problem of storing an archive of versioned data in a reliable and efficient manner in distributed storage systems. We propose a new storage technique called differential erasure coding (DEC) where the differences (deltas) between subsequent versions are stored rather than the whole objects, akin to a typical delta encoding technique. However, unlike delta encoding techniques, DEC opportunistically exploits the sparsity (i.e., when the differences between two successive versions have few non-zero entries) in the updates to store the deltas using compressed sensing techniques applied with erasure coding. We first show that DEC provides significant savings in the storage size for versioned data whenever the update patterns are characterized by in-place alterations. Subsequently, we propose a practical DEC framework so as to reap storage size benefits against not just in-place alterations but also real-world update patterns such as insertions and deletions that alter the overall data sizes. We conduct experiments with several synthetic workloads to demonstrate that the practical variant of DEC provides significant reductions in storage overhead (up to 60\% depending on the workload) compared to baseline storage system which incorporates concepts from Rsync, a delta encoding technique to store and synchronize data across a network.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient I/O Access in Delta based Versioning Systems
Authors:
J. Harshan,
Frédérique Oggier,
Anwitaman Datta
Abstract:
In this paper we study the problem of storing reliably an archive of versioned data. Specifically, we focus on systems where the differences (deltas) between subsequent versions rather than the whole objects are stored - a typical model for storing versioned data. For reliability, we propose erasure encoding techniques that exploit the sparsity of information in the deltas while storing them relia…
▽ More
In this paper we study the problem of storing reliably an archive of versioned data. Specifically, we focus on systems where the differences (deltas) between subsequent versions rather than the whole objects are stored - a typical model for storing versioned data. For reliability, we propose erasure encoding techniques that exploit the sparsity of information in the deltas while storing them reliably in a distributed back-end storage system, resulting in improved I/O read performance to retrieve the whole versioned archive. Along with the basic techniques, we propose a few optimization heuristics, and evaluate the techniques' efficacy analytically and with numerical simulations.
△ Less
Submitted 18 November, 2014;
originally announced November 2014.
-
Rank weight hierarchy of some classes of cyclic codes
Authors:
Jérôme Ducoat,
Frédérique Oggier
Abstract:
We study the rank weight hierarchy, thus in particular the rank metric, of cyclic codes over the finite field $\mathbb F_{q^m}$, $q$ a prime power, $m \geq 2$. We establish the rank weight hierarchy for $[n,n-1]$ cyclic codes and characterize $[n,k]$ cyclic codes of rank metric 1 when (1) $k=1$, (2) $n$ and $q$ are coprime, and (3) the characteristic $char(\mathbb F_q)$ divides $n$. Finally, for…
▽ More
We study the rank weight hierarchy, thus in particular the rank metric, of cyclic codes over the finite field $\mathbb F_{q^m}$, $q$ a prime power, $m \geq 2$. We establish the rank weight hierarchy for $[n,n-1]$ cyclic codes and characterize $[n,k]$ cyclic codes of rank metric 1 when (1) $k=1$, (2) $n$ and $q$ are coprime, and (3) the characteristic $char(\mathbb F_q)$ divides $n$. Finally, for $n$ and $q$ coprime, cyclic codes of minimal $r$-rank are characterized, and a refinement of the Singleton bound for the rank weight is derived.
△ Less
Submitted 15 July, 2014;
originally announced July 2014.
-
Construction A of Lattices over Number Fields and Block Fading Wiretap Coding
Authors:
Wittawat Kositwattanarerk,
Soon Sheng Ong,
Frédérique Oggier
Abstract:
We propose a lattice construction from totally real and CM fields, which naturally generalizes the Construction A of lattices from $p$-ary codes obtained from the cyclotomic field $\mathbb{Q}(ζ_p)$, $p$ a prime, which in turn contains the so-called Construction A of lattices from binary codes as a particular case. We focus on the maximal totally real subfield $\mathbb{Q}(ζ_{p^r}+ζ_{p}^{-r})$ of th…
▽ More
We propose a lattice construction from totally real and CM fields, which naturally generalizes the Construction A of lattices from $p$-ary codes obtained from the cyclotomic field $\mathbb{Q}(ζ_p)$, $p$ a prime, which in turn contains the so-called Construction A of lattices from binary codes as a particular case. We focus on the maximal totally real subfield $\mathbb{Q}(ζ_{p^r}+ζ_{p}^{-r})$ of the cyclotomic field $\mathbb{Q}(ζ_{p^r})$, $r\geq 1$. Our construction has applications to coset encoding of algebraic lattice codes, and we detail the case of coset encoding of block fading wiretap codes.
△ Less
Submitted 12 December, 2014; v1 submitted 10 April, 2014;
originally announced April 2014.
-
Connections Between Construction D and Related Constructions of Lattices
Authors:
Wittawat Kositwattanarerk,
Frédérique Oggier
Abstract:
Most practical constructions of lattice codes with high coding gains are multilevel constructions where each level corresponds to an underlying code component. Construction D, Construction D$'$, and Forney's code formula are classical constructions that produce such lattices explicitly from a family of nested binary linear codes. In this paper, we investigate these three closely related constructi…
▽ More
Most practical constructions of lattice codes with high coding gains are multilevel constructions where each level corresponds to an underlying code component. Construction D, Construction D$'$, and Forney's code formula are classical constructions that produce such lattices explicitly from a family of nested binary linear codes. In this paper, we investigate these three closely related constructions along with the recently developed Construction A$'$ of lattices from codes over the polynomial ring $\mathbb{F}_2[u]/u^a$. We show that Construction by Code Formula produces a lattice packing if and only if the nested codes being used are closed under Schur product, thus proving the similarity of Construction D and Construction by Code Formula when applied to Reed-Muller codes. In addition, we relate Construction by Code Formula to Construction A$'$ by finding a correspondence between nested binary codes and codes over $\mathbb{F}_2[u]/u^a$. This proves that any lattice constructible using Construction by Code Formula is also constructible using Construction A$'$. Finally, we show that Construction A$'$ produces a lattice if and only if the corresponding code over $\mathbb{F}_2[u]/u^a$ is closed under shifted Schur product.
△ Less
Submitted 2 January, 2014; v1 submitted 26 August, 2013;
originally announced August 2013.
-
2- and 3-modular Lattice Wiretap Codes in Small Dimensions
Authors:
Fuchun Lin,
Frédérique Oggier,
Patrick Solé
Abstract:
A recent line of work on lattice codes for Gaussian wiretap channels introduced a new lattice invariant called secrecy gain as a code design criterion which captures the confusion that lattice coding produces at an eavesdropper. Following up the study of unimodular lattice wiretap codes [1], this paper investigates 2- and 3-modular lattices and compares them with unimodular lattices. Most even 2-…
▽ More
A recent line of work on lattice codes for Gaussian wiretap channels introduced a new lattice invariant called secrecy gain as a code design criterion which captures the confusion that lattice coding produces at an eavesdropper. Following up the study of unimodular lattice wiretap codes [1], this paper investigates 2- and 3-modular lattices and compares them with unimodular lattices. Most even 2- and 3-modular lattices are found to have better performance, that is, a higher secrecy gain than the best unimodular lattices in dimension n, n is between 2 and 23. Odd 2-modular lattices are considered, too, and three lattices are found to outperform the best unimodular lattices.
△ Less
Submitted 16 April, 2013;
originally announced April 2013.
-
Locally Repairable Codes with Multiple Repair Alternatives
Authors:
Lluis Pamies-Juarez,
Henk D. L. Hollmann,
Frédérique Oggier
Abstract:
Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they require retrieval o…
▽ More
Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they require retrieval of larger amounts of data from larger subsets of storage nodes. To mitigate these problems, several recent works have presented locally repairable codes designed to minimize the repair traffic and the number of nodes involved per repair. Unfortunately, existing methods often lead to codes where there is only one subset of nodes able to repair a piece of lost data, limiting the local repairability to the availability of the nodes in this subset. In this paper, we present a new family of locally repairable codes that allows different trade-offs between the number of contacted nodes per repair, and the number of different subsets of nodes that enable this repair. We show that slightly increasing the number of contacted nodes per repair allows to have repair alternatives, which in turn increases the probability of being able to perform efficient repairs. Finally, we present pg-BLRC, an explicit construction of locally repairable codes with multiple repair alternatives, constructed from partial geometries, in particular from Generalized Quadrangles. We show how these codes can achieve practical lengths and high rates, while requiring a small number of nodes per repair, and providing multiple repair alternatives.
△ Less
Submitted 15 May, 2013; v1 submitted 22 February, 2013;
originally announced February 2013.
-
Explicit Constructions of Quasi-Uniform Codes from Groups
Authors:
Eldho K. Thomas,
Frederique Oggier
Abstract:
We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.
We address the question of constructing explicitly quasi-uniform codes from groups. We determine the size of the codebook, the alphabet and the minimum distance as a function of the corresponding group, both for abelian and some nonabelian groups. Potentials applications comprise the design of almost affine codes and non-linear network codes.
△ Less
Submitted 27 January, 2013;
originally announced January 2013.
-
On Abelian Group Representability of Finite Groups
Authors:
Eldho K. Thomas,
Nadya Markin,
Frédérique Oggier
Abstract:
A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in…
▽ More
A set of quasi-uniform random variables $X_1,...,X_n$ may be generated from a finite group $G$ and $n$ of its subgroups, with the corresponding entropic vector depending on the subgroup structure of $G$. It is known that the set of entropic vectors obtained by considering arbitrary finite groups is much richer than the one provided just by abelian groups. In this paper, we start to investigate in more detail different families of non-abelian groups with respect to the entropic vectors they yield. In particular, we address the question of whether a given non-abelian group $G$ and some fixed subgroups $G_1,...,G_n$ end up giving the same entropic vector as some abelian group $A$ with subgroups $A_1,...,A_n$, in which case we say that $(A, A_1,..., A_n)$ represents $(G, G_1, ..., G_n)$. If for any choice of subgroups $G_1,...,G_n$, there exists some abelian group $A$ which represents $G$, we refer to $G$ as being abelian (group) representable for $n$. We completely characterize dihedral, quasi-dihedral and dicyclic groups with respect to their abelian representability, as well as the case when $n=2$, for which we show a group is abelian representable if and only if it is nilpotent. This problem is motivated by understanding non-linear coding strategies for network coding, and network information theory capacity regions.
△ Less
Submitted 8 December, 2012; v1 submitted 6 December, 2012;
originally announced December 2012.
-
Quotients of Orders in Cyclic Algebras and Space-Time Codes
Authors:
Frederique Oggier,
B. A. Sethuraman
Abstract:
Let $F$ be a number field with ring of integers $\Oc_F$ and $\Dc$ a division $F$-algebra with a maximal cyclic subfield $K$. We study rings occurring as quotients of a natural $\Oc_F$-order $Λ$ in $\Dc$ by two-sided ideals. We reduce the problem to studying the ideal structure of $Λ/\qf^sΛ$, where $\qf$ is a prime ideal in $\Oc_F$, $s\geq 1$. We study the case where $\qf$ remains unramified in…
▽ More
Let $F$ be a number field with ring of integers $\Oc_F$ and $\Dc$ a division $F$-algebra with a maximal cyclic subfield $K$. We study rings occurring as quotients of a natural $\Oc_F$-order $Λ$ in $\Dc$ by two-sided ideals. We reduce the problem to studying the ideal structure of $Λ/\qf^sΛ$, where $\qf$ is a prime ideal in $\Oc_F$, $s\geq 1$. We study the case where $\qf$ remains unramified in $K$, both when $s=1$ and $s>1$. This work is motivated by its applications to space-time coded modulation.
△ Less
Submitted 25 October, 2012;
originally announced October 2012.
-
RapidRAID: Pipelined Erasure Codes for Fast Data Archival in Distributed Storage Systems
Authors:
Lluis Pamies-Juarez,
Anwitaman Datta,
Frederique Oggier
Abstract:
To achieve reliability in distributed storage systems, data has usually been replicated across different nodes. However the increasing volume of data to be stored has motivated the introduction of erasure codes, a storage efficient alternative to replication, particularly suited for archival in data centers, where old datasets (rarely accessed) can be erasure encoded, while replicas are maintained…
▽ More
To achieve reliability in distributed storage systems, data has usually been replicated across different nodes. However the increasing volume of data to be stored has motivated the introduction of erasure codes, a storage efficient alternative to replication, particularly suited for archival in data centers, where old datasets (rarely accessed) can be erasure encoded, while replicas are maintained only for the latest data. Many recent works consider the design of new storage-centric erasure codes for improved repairability. In contrast, this paper addresses the migration from replication to encoding: traditionally erasure coding is an atomic operation in that a single node with the whole object encodes and uploads all the encoded pieces. Although large datasets can be concurrently archived by distributing individual object encodings among different nodes, the network and computing capacity of individual nodes constrain the archival process due to such atomicity.
We propose a new pipelined coding strategy that distributes the network and computing load of single-object encodings among different nodes, which also speeds up multiple object archival. We further present RapidRAID codes, an explicit family of pipelined erasure codes which provides fast archival without compromising either data reliability or storage overheads. Finally, we provide a real implementation of RapidRAID codes and benchmark its performance using both a cluster of 50 nodes and a set of Amazon EC2 instances. Experiments show that RapidRAID codes reduce a single object's coding time by up to 90%, while when multiple objects are encoded concurrently, the reduction is up to 20%.
△ Less
Submitted 3 August, 2012; v1 submitted 29 July, 2012;
originally announced July 2012.
-
An Empirical Study of the Repair Performance of Novel Coding Schemes for Networked Distributed Storage Systems
Authors:
Lluis Pamies-Juarez,
Frédérique Oggier,
Anwitaman Datta
Abstract:
Erasure coding techniques are getting integrated in networked distributed storage systems as a way to provide fault-tolerance at the cost of less storage overhead than traditional replication. Redundancy is maintained over time through repair mechanisms, which may entail large network resource overheads. In recent years, several novel codes tailor-made for distributed storage have been proposed to…
▽ More
Erasure coding techniques are getting integrated in networked distributed storage systems as a way to provide fault-tolerance at the cost of less storage overhead than traditional replication. Redundancy is maintained over time through repair mechanisms, which may entail large network resource overheads. In recent years, several novel codes tailor-made for distributed storage have been proposed to optimize storage overhead and repair, such as Regenerating Codes that minimize the per repair traffic, or Self-Repairing Codes which minimize the number of nodes contacted per repair. Existing studies of these coding techniques are however predominantly theoretical, under the simplifying assumption that only one object is stored. They ignore many practical issues that real systems must address, such as data placement, de/correlation of multiple stored objects, or the competition for limited network resources when multiple objects are repaired simultaneously. This paper empirically studies the repair performance of these novel storage centric codes with respect to classical erasure codes by simulating realistic scenarios and exploring the interplay of code parameters, failure characteristics and data placement with respect to the trade-offs of bandwidth usage and speed of repairs.
△ Less
Submitted 11 June, 2012;
originally announced June 2012.
-
Iterated Space-Time Code Constructions from Cyclic Algebras
Authors:
Nadya Markin,
Frederique Oggier
Abstract:
We propose a full-rate iterated space-time code construction, to design 2n-dimensional codes from n-dimensional cyclic algebra based codes. We give a condition to determine whether the resulting codes satisfy the full-diversity property, and study their maximum likelihood decoding complexity with respect to sphere decoding. Particular emphasis is given to the cases n = 2, sometimes referred to as…
▽ More
We propose a full-rate iterated space-time code construction, to design 2n-dimensional codes from n-dimensional cyclic algebra based codes. We give a condition to determine whether the resulting codes satisfy the full-diversity property, and study their maximum likelihood decoding complexity with respect to sphere decoding. Particular emphasis is given to the cases n = 2, sometimes referred to as MIDO (multiple input double output) codes, and n = 3. In the process, we derive an interesting way of obtaining division algebras, and study their center and maximal subfield.
△ Less
Submitted 11 March, 2013; v1 submitted 23 May, 2012;
originally announced May 2012.
-
A Classification of Unimodular Lattice Wiretap Codes in Small Dimensions
Authors:
Fuchun Lin,
Frédérique Oggier
Abstract:
Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions between a transmitter and a legitimate receiver, is considered. A new lattice invariant called the secrecy gain is used as a code design criterion for wiretap lattice codes since it was shown to characterize the confusion that a chosen lattice can cause at the eavesdropper: the higher the secrecy gain of…
▽ More
Lattice coding over a Gaussian wiretap channel, where an eavesdropper listens to transmissions between a transmitter and a legitimate receiver, is considered. A new lattice invariant called the secrecy gain is used as a code design criterion for wiretap lattice codes since it was shown to characterize the confusion that a chosen lattice can cause at the eavesdropper: the higher the secrecy gain of the lattice, the more confusion. In this paper, a formula for the secrecy gain of unimodular lattices is derived. Secrecy gains of extremal odd unimodular lattices as well as unimodular lattices in dimension n, 16 \leq n \leq 23 are computed, covering the 4 extremal odd unimodular lattices and all the 111 nonextremal unimodular lattices (both odd and even) providing thus a classification of the best wiretap lattice codes coming from unimodular lattices in dimension n, 8 < n \leq 23. Finally, to permit lattice encoding via Construction A, the corresponding error correction codes are determined.
△ Less
Submitted 17 January, 2012;
originally announced January 2012.
-
In-Network Redundancy Generation for Opportunistic Speedup of Backup
Authors:
Lluis Pamies-Juarez,
Anwitaman Datta,
Frédérique Oggier
Abstract:
Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited communication and computation capabilities, which constrain the…
▽ More
Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited communication and computation capabilities, which constrain the storage process throughput. Moreover, the source node and the different storage nodes might not be able to send and receive data simultaneously -- e.g., nodes might be busy in a datacenter setting, or simply be offline in a peer-to-peer setting -- which can further threaten the efficacy of the overall storage process. In this paper we propose an "in-network" redundancy generation process which distributes the data insertion load among the source and storage nodes by allowing the storage nodes to generate new redundant data by exchanging partial information among themselves, improving the throughput of the storage process. The process is carried out asynchronously, utilizing spare bandwidth and computing resources from the storage nodes. The proposed approach leverages on the local repairability property of newly proposed erasure codes tailor made for the needs of distributed storage systems. We analytically show that the performance of this technique relies on an efficient usage of the spare node resources, and we derive a set of scheduling algorithms to maximize the same. We experimentally show, using availability traces from real peer-to-peer applications as well as Google data center availability and workload traces, that our algorithms can, depending on the environment characteristics, increase the throughput of the storage process significantly (up to 90% in data centers, and 60% in peer-to-peer settings) with respect to the classical naive data insertion approach.
△ Less
Submitted 19 February, 2013; v1 submitted 18 November, 2011;
originally announced November 2011.
-
An Error Probability Approach to MIMO Wiretap Channels
Authors:
Jean-Claude Belfiore,
Frédérique Oggier
Abstract:
We consider MIMO (Multiple Input Multiple Output) wiretap channels, where a legitimate transmitter Alice is communicating with a legitimate receiver Bob in the presence of an eavesdropper Eve, and communication is done via MIMO channels. We suppose that Alice's strategy is to use a codebook which has a lattice structure, which then allows her to perform coset encoding. We analyze Eve's probability…
▽ More
We consider MIMO (Multiple Input Multiple Output) wiretap channels, where a legitimate transmitter Alice is communicating with a legitimate receiver Bob in the presence of an eavesdropper Eve, and communication is done via MIMO channels. We suppose that Alice's strategy is to use a codebook which has a lattice structure, which then allows her to perform coset encoding. We analyze Eve's probability of correctly decoding the message Alice meant to Bob, and from minimizing this probability, we derive a code design criterion for MIMO lattice wiretap codes. The case of block fading channels is treated similarly, and fast fading channels are derived as a particular case. The Alamouti code is carefully studied as an illustration of the analysis provided.
△ Less
Submitted 9 January, 2013; v1 submitted 29 September, 2011;
originally announced September 2011.
-
An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems
Authors:
Anwitaman Datta,
Frederique Oggier
Abstract:
The continuously increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the needs of distributed networked storage systems, trying to reach the best compromise among storage space efficiency, fault tolerance, and maintenance overheads. Four families of codes tailor-made f…
▽ More
The continuously increasing amount of digital data generated by today's society asks for better storage solutions. This survey looks at a new generation of coding techniques designed specifically for the needs of distributed networked storage systems, trying to reach the best compromise among storage space efficiency, fault tolerance, and maintenance overheads. Four families of codes tailor-made for distributed settings, namely - pyramid, hierarchical, regenerating and self-repairing codes - are presented at a high level, emphasizing the main ideas behind each of these codes, and discussing their pros and cons, before concluding with a quantitative comparison among them. This survey deliberately excluded technical details for the codes, nor does it provide an exhaustive summary of the numerous works. Instead, it provides an overview of the major code families in a manner easily accessible to a broad audience, by presenting the big picture of advances in coding techniques for distributed storage solutions.
△ Less
Submitted 29 January, 2013; v1 submitted 11 September, 2011;
originally announced September 2011.
-
Homomorphic Self-repairing Codes for Agile Maintenance of Distributed Storage Systems
Authors:
Frederique Oggier,
Anwitaman Datta
Abstract:
Distributed data storage systems are essential to deal with the need to store massive volumes of data. In order to make such a system fault-tolerant, some form of redundancy becomes crucial, incurring various overheads - most prominently in terms of storage space and maintenance bandwidth requirements. Erasure codes, originally designed for communication over lossy channels, provide a storage effi…
▽ More
Distributed data storage systems are essential to deal with the need to store massive volumes of data. In order to make such a system fault-tolerant, some form of redundancy becomes crucial, incurring various overheads - most prominently in terms of storage space and maintenance bandwidth requirements. Erasure codes, originally designed for communication over lossy channels, provide a storage efficient alternative to replication based redundancy, however entailing high communication overhead for maintenance, when some of the encoded fragments need to be replenished in news ones after failure of some storage devices. We propose as an alternative a new family of erasure codes called self-repairing codes (SRC) taking into account the peculiarities of distributed storage systems, specifically the maintenance process. SRC has the following salient features: (a) encoded fragments can be repaired directly from other subsets of encoded fragments by downloading less data than the size of the complete object, ensuring that (b) a fragment is repaired from a fixed number of encoded fragments, the number depending only on how many encoded blocks are missing and independent of which specific blocks are missing. This paper lays the foundations by defining the novel self-repairing codes, elaborating why the defined characteristics are desirable for distributed storage systems. Then homomorphic self-repairing codes (HSRC) are proposed as a concrete instance, whose various aspects and properties are studied and compared - quantitatively or qualitatively with respect to other codes including traditional erasure codes as well as other recent codes designed specifically for storage applications.
△ Less
Submitted 15 July, 2011;
originally announced July 2011.
-
Byzantine Fault Tolerance of Regenerating Codes
Authors:
Frédérique Oggier,
Anwitaman Datta
Abstract:
Recent years have witnessed a slew of coding techniques custom designed for networked storage systems. Network coding inspired regenerating codes are the most prolifically studied among these new age storage centric codes. A lot of effort has been invested in understanding the fundamental achievable trade-offs of storage and bandwidth usage to maintain redundancy in presence of different models of…
▽ More
Recent years have witnessed a slew of coding techniques custom designed for networked storage systems. Network coding inspired regenerating codes are the most prolifically studied among these new age storage centric codes. A lot of effort has been invested in understanding the fundamental achievable trade-offs of storage and bandwidth usage to maintain redundancy in presence of different models of failures, showcasing the efficacy of regenerating codes with respect to traditional erasure coding techniques. For practical usability in open and adversarial environments, as is typical in peer-to-peer systems, we need however not only resilience against erasures, but also from (adversarial) errors. In this paper, we study the resilience of generalized regenerating codes (supporting multi-repairs, using collaboration among newcomers) in the presence of two classes of Byzantine nodes, relatively benign selfish (non-cooperating) nodes, as well as under more active, malicious polluting nodes. We give upper bounds on the resilience capacity of regenerating codes, and show that the advantages of collaborative repair can turn to be detrimental in the presence of Byzantine nodes. We further exhibit that system mechanisms can be combined with regenerating codes to mitigate the effect of rogue nodes.
△ Less
Submitted 12 June, 2011;
originally announced June 2011.
-
Self-Repairing Codes for Distributed Storage - A Projective Geometric Construction
Authors:
Frederique Oggier,
Anwitaman Datta
Abstract:
Self-Repairing Codes (SRC) are codes designed to suit the need of coding for distributed networked storage: they not only allow stored data to be recovered even in the presence of node failures, they also provide a repair mechanism where as little as two live nodes can be contacted to regenerate the data of a failed node. In this paper, we propose a new instance of self-repairing codes, based on c…
▽ More
Self-Repairing Codes (SRC) are codes designed to suit the need of coding for distributed networked storage: they not only allow stored data to be recovered even in the presence of node failures, they also provide a repair mechanism where as little as two live nodes can be contacted to regenerate the data of a failed node. In this paper, we propose a new instance of self-repairing codes, based on constructions of spreads coming from projective geometry. We study some of their properties to demonstrate the suitability of these codes for distributed networked storage.
△ Less
Submitted 2 May, 2011;
originally announced May 2011.
-
Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis
Authors:
Frédérique Oggier,
Patrick Solé,
Jean-Claude Belfiore
Abstract:
We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve's probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice codes,…
▽ More
We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve's probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice codes, expressed in terms of the lattice theta series, which characterizes Eve's confusion as a function of the channel parameters. The secrecy gain is studied for even unimodular lattices, and an asymptotic analysis shows that it grows exponentially in the dimension of the lattice. Examples of wiretap lattice codes are given. Interestingly, minimizing Eve's probability of error involves the same optimization of the theta series as does the flatness factor, another newly defined code design that characterizes lattice codes that achieve strong secrecy.
△ Less
Submitted 9 January, 2013; v1 submitted 21 March, 2011;
originally announced March 2011.
-
A family of fast-decodable MIDO codes from crossed-product algebras over Q
Authors:
Laura Luzzi,
Frédérique Oggier
Abstract:
Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable devices. Previous MIDO code constructions with low Maximum Likelihood (ML) decoding complexity, full diversity and the non-vanishing determinant (NVD) property are mostly based on cyclic division algebras. In this paper, a new…
▽ More
Multiple Input Double Output (MIDO) asymmetric space-time codes for 4 transmit antennas and 2 receive antennas can be employed in the downlink from base stations to portable devices. Previous MIDO code constructions with low Maximum Likelihood (ML) decoding complexity, full diversity and the non-vanishing determinant (NVD) property are mostly based on cyclic division algebras. In this paper, a new family of MIDO codes with the NVD property based on crossed-product algebras over Q is introduced. Fast decodability follows naturally from the structure of the codewords which consist of four generalized Alamouti blocks. The associated ML complexity order is the lowest known for full-rate MIDO codes (O(M^{10}) instead of O(M^{16}) with respect to the real constellation size M). Numerical simulations show that these codes have a performance from comparable up to 1dB gain compared to the best known MIDO code with the same complexity.
△ Less
Submitted 16 February, 2011;
originally announced February 2011.
-
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm
Authors:
Miodrag J. Mihaljevic,
Frederique Oggier,
Hideki Imai
Abstract:
This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance th…
▽ More
This paper addresses the design of a dedicated homophonic coding for a class of communication systems which, in order to provide both reliability and security, first encode the data before encrypting it, which is referred to as the encoding-encryption paradigm. The considered systems employ error-correction coding for reliability, a stream cipher for encryption, and homophonic coding to enhance the protection of the key used in the stream cipher, on which relies the security of all the system transmissions. This paper presents a security evaluation of such systems from a computational complexity point of view, which serves as a source for establishing dedicated homophonic code design criteria. The security evaluation shows that the computational complexity of recovering the secret key, given all the information an attacker could gather during passive attacks he can mount, is lower bounded by the complexity of the related LPN (Learning Parity in Noise) problem in both the average and worst case. This gives guidelines to construct a dedicated homophonic encoder which maximizes the complexity of the underlying LPN problem for a given encoding overhead. Finally, this paper proposes a generic homophonic coding strategy that fulfills the proposed design criteria and thus both enhances security while minimizing the induced overhead.
△ Less
Submitted 29 December, 2010;
originally announced December 2010.
-
Lattice Code Design for the Rayleigh Fading Wiretap Channel
Authors:
Jean-Claude Belfiore,
Frederique Oggier
Abstract:
It has been shown recently that coding for the Gaussian Wiretap Channel can be done with nested lattices. A fine lattice intended to the legitimate user must be designed as a usual lattice code for the Gaussian Channel, while a coarse lattice is added to introduce confusion at the eavesdropper, whose theta series must be minimized. We present a design criterion for both the fine and coarse lattice…
▽ More
It has been shown recently that coding for the Gaussian Wiretap Channel can be done with nested lattices. A fine lattice intended to the legitimate user must be designed as a usual lattice code for the Gaussian Channel, while a coarse lattice is added to introduce confusion at the eavesdropper, whose theta series must be minimized. We present a design criterion for both the fine and coarse lattice to obtain wiretap lattice codes for the Rayleigh fading Wiretap Channel.
△ Less
Submitted 19 December, 2010;
originally announced December 2010.
-
Fast-Decodable Asymmetric Space-Time Codes from Division Algebras
Authors:
Roope Vehkalahti,
Camilla Hollanti,
Frédérique Oggier
Abstract:
Multiple-input double-output (MIDO) codes are important in the near-future wireless communications, where the portable end-user device is physically small and will typically contain at most two receive antennas. Especially tempting is the 4 x 2 channel due to its immediate applicability in the digital video broadcasting (DVB). Such channels optimally employ rate-two space-time (ST) codes consistin…
▽ More
Multiple-input double-output (MIDO) codes are important in the near-future wireless communications, where the portable end-user device is physically small and will typically contain at most two receive antennas. Especially tempting is the 4 x 2 channel due to its immediate applicability in the digital video broadcasting (DVB). Such channels optimally employ rate-two space-time (ST) codes consisting of (4 x 4) matrices. Unfortunately, such codes are in general very complex to decode, hence setting forth a call for constructions with reduced complexity.
Recently, some reduced complexity constructions have been proposed, but they have mainly been based on different ad hoc methods and have resulted in isolated examples rather than in a more general class of codes. In this paper, it will be shown that a family of division algebra based MIDO codes will always result in at least 37.5% worst-case complexity reduction, while maintaining full diversity and, for the first time, the non-vanishing determinant (NVD) property. The reduction follows from the fact that, similarly to the Alamouti code, the codes will be subsets of matrix rings of the Hamiltonian quaternions, hence allowing simplified decoding. At the moment, such reductions are among the best known for rate-two MIDO codes. Several explicit constructions are presented and shown to have excellent performance through computer simulations.
△ Less
Submitted 27 October, 2010;
originally announced October 2010.
-
Codes over Matrix Rings for Space-Time Coded Modulations
Authors:
Frederique Oggier,
Patrick Sole,
Jean-Claude Belfiore
Abstract:
It is known that, for transmission over quasi-static MIMO fading channels with n transmit antennas, diversity can be obtained by using an inner fully diverse space-time block code while coding gain, derived from the determinant criterion, comes from an appropriate outer code. When the inner code has a cyclic algebra structure over a number field, as for perfect space-time codes, an outer code can…
▽ More
It is known that, for transmission over quasi-static MIMO fading channels with n transmit antennas, diversity can be obtained by using an inner fully diverse space-time block code while coding gain, derived from the determinant criterion, comes from an appropriate outer code. When the inner code has a cyclic algebra structure over a number field, as for perfect space-time codes, an outer code can be designed via coset coding. More precisely, we take the quotient of the algebra by a two-sided ideal which leads to a finite alphabet for the outer code, with a cyclic algebra structure over a finite field or a finite ring. We show that the determinant criterion induces various metrics on the outer code, such as the Hamming and Bachoc distances. When n=2, partitioning the 2x2 Golden code by using an ideal above the prime 2 leads to consider codes over either M2(F_2) or M2(F_2[i]), both being non-commutative alphabets. Matrix rings of higher dimension, suitable for 3x3 and 4x4 perfect codes, give rise to more complex examples.
△ Less
Submitted 8 August, 2010;
originally announced August 2010.
-
An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm
Authors:
Frederique Oggier,
Miodrag J. Mihaljevic
Abstract:
This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophoni…
▽ More
This paper proposes a generic approach for providing enhanced security to communication systems which encode their data for reliability before encrypting it through a stream cipher for security. We call this counter-intuitive technique the {\em encoding-encryption} paradigm, and use as motivating example the standard for mobile telephony GSM. The enhanced security is based on a dedicated homophonic or wire-tap channel coding that introduces pure randomness, combined with the randomness of the noise occurring over the communication channel. Security evaluation regarding recovery of the secret key employed in the keystream generator is done through an information theoretical approach. We show that with the aid of a dedicated wire-tap encoder, the amount of uncertainty that the adversary must face about the secret key given all the information he could gather during different passive or active attacks he can mount, is a decreasing function of the sample available for cryptanalysis. This means that the wire-tap encoder can indeed provide an information theoretical security level over a period of time, but after a large enough sample is collected the function tends to zero, entering a regime in which a computational security analysis is needed for estimation of the resistance against the secret key recovery.
△ Less
Submitted 5 August, 2010;
originally announced August 2010.
-
Self-repairing Homomorphic Codes for Distributed Storage Systems
Authors:
Frederique Oggier,
Anwitaman Datta
Abstract:
Erasure codes provide a storage efficient alternative to replication based redundancy in (networked) storage systems. They however entail high communication overhead for maintenance, when some of the encoded fragments are lost and need to be replenished. Such overheads arise from the fundamental need to recreate (or keep separately) first a copy of the whole object before any individual encoded fr…
▽ More
Erasure codes provide a storage efficient alternative to replication based redundancy in (networked) storage systems. They however entail high communication overhead for maintenance, when some of the encoded fragments are lost and need to be replenished. Such overheads arise from the fundamental need to recreate (or keep separately) first a copy of the whole object before any individual encoded fragment can be generated and replenished. There has been recently intense interest to explore alternatives, most prominent ones being regenerating codes (RGC) and hierarchical codes (HC). We propose as an alternative a new family of codes to improve the maintenance process, which we call self-repairing codes (SRC), with the following salient features: (a) encoded fragments can be repaired directly from other subsets of encoded fragments without having to reconstruct first the original data, ensuring that (b) a fragment is repaired from a fixed number of encoded fragments, the number depending only on how many encoded blocks are missing and independent of which specific blocks are missing. These properties allow for not only low communication overhead to recreate a missing fragment, but also independent reconstruction of different missing fragments in parallel, possibly in different parts of the network. We analyze the static resilience of SRCs with respect to traditional erasure codes, and observe that SRCs incur marginally larger storage overhead in order to achieve the aforementioned properties. The salient SRC properties naturally translate to low communication overheads for reconstruction of lost fragments, and allow reconstruction with lower latency by facilitating repairs in parallel. These desirable properties make self-repairing codes a good and practical candidate for networked distributed storage systems.
△ Less
Submitted 31 July, 2010;
originally announced August 2010.
-
Secrecy Gain: a Wiretap Lattice Code Design
Authors:
Jean-Claude Belfiore,
Frédérique Oggier
Abstract:
We propose the notion of secrecy gain as a code design criterion for wiretap lattice codes to be used over an additive white Gaussian noise channel. Our analysis relies on the error probabilites of both the legitimate user and the eavesdropper. We focus on geometrical properties of lattices, described by their theta series, to characterize good wiretap codes.
We propose the notion of secrecy gain as a code design criterion for wiretap lattice codes to be used over an additive white Gaussian noise channel. Our analysis relies on the error probabilites of both the legitimate user and the eavesdropper. We focus on geometrical properties of lattices, described by their theta series, to characterize good wiretap codes.
△ Less
Submitted 8 July, 2010; v1 submitted 23 April, 2010;
originally announced April 2010.
-
An Authentication Code against Pollution Attacks in Network Coding
Authors:
Frederique Oggier,
Hanane Fathi
Abstract:
Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code suitable fo…
▽ More
Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code suitable for multicast network coding. The proposed scheme is robust against pollution attacks from outsiders, as well as coalitions of malicious insiders. Intermediate nodes can verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious messages in-transit that fail the verification. This way, the pollution is canceled out before reaching the destinations. We analyze the performance of the scheme in terms of both multicast throughput and goodput, and show the goodput gains. We also discuss applications to file distribution.
△ Less
Submitted 17 September, 2009;
originally announced September 2009.
-
On Cyclic and Nearly Cyclic Multiagent Interactions in the Plane
Authors:
Frederique Oggier,
Alfred Bruckstein
Abstract:
We discuss certain types of cyclic and nearly cyclic interactions among N "point"-agents in the plane, leading to formations of interesting limiting geometric configurations. Cyclic pursuit and local averaging interactions have been analyzed in the context of multi-agent gathering. In this paper, we consider some nearly cyclic interactions that break symmetry leading to factor circulants rather…
▽ More
We discuss certain types of cyclic and nearly cyclic interactions among N "point"-agents in the plane, leading to formations of interesting limiting geometric configurations. Cyclic pursuit and local averaging interactions have been analyzed in the context of multi-agent gathering. In this paper, we consider some nearly cyclic interactions that break symmetry leading to factor circulants rather than circulant interaction matrices.
△ Less
Submitted 16 July, 2009;
originally announced July 2009.
-
The Secrecy Capacity of the MIMO Wiretap Channel
Authors:
Frédérique Oggier,
Babak Hassibi
Abstract:
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of informati…
▽ More
We consider the MIMO wiretap channel, that is a MIMO broadcast channel where the transmitter sends some confidential information to one user which is a legitimate receiver, while the other user is an eavesdropper. Perfect secrecy is achieved when the the transmitter and the legitimate receiver can communicate at some positive rate, while insuring that the eavesdropper gets zero bits of information. In this paper, we compute the perfect secrecy capacity of the multiple antenna MIMO broadcast channel, where the number of antennas is arbitrary for both the transmitter and the two receivers.
△ Less
Submitted 9 October, 2007;
originally announced October 2007.
-
Perfect Space Time Block Codes
Authors:
F. Oggier,
G. Rekaya-Ben Othman,
J. -C. Belfiore,
E. Viterbo
Abstract:
In this paper, we introduce the notion of perfect space-time block codes (STBC). These codes have full rate, full diversity, non-vanishing constant minimum determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping. We present algebraic constructions of perfect STBCs for 2, 3, 4 and 6 antennas.
In this paper, we introduce the notion of perfect space-time block codes (STBC). These codes have full rate, full diversity, non-vanishing constant minimum determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping. We present algebraic constructions of perfect STBCs for 2, 3, 4 and 6 antennas.
△ Less
Submitted 24 April, 2006;
originally announced April 2006.
-
Families of unitary matrices achieving full diversity
Authors:
Frederique Oggier,
Emmanuel Lequeu
Abstract:
This paper presents an algebraic construction of families of unitary matrices that achieve full diversity. They are obtained as subsets of cyclic division algebras.
This paper presents an algebraic construction of families of unitary matrices that achieve full diversity. They are obtained as subsets of cyclic division algebras.
△ Less
Submitted 17 August, 2005;
originally announced August 2005.
-
Nonintersecting Subspaces Based on Finite Alphabets
Authors:
Frederique E. Oggier,
N. J. A. Sloane,
A. R. Calderbank,
Suhas N. Diggavi
Abstract:
Two subspaces of a vector space are here called ``nonintersecting'' if they meet only in the zero vector. The following problem arises in the design of noncoherent multiple-antenna communications systems. How many pairwise nonintersecting M_t-dimensional subspaces of an m-dimensional vector space V over a field F can be found, if the generator matrices for the subspaces may contain only symbols…
▽ More
Two subspaces of a vector space are here called ``nonintersecting'' if they meet only in the zero vector. The following problem arises in the design of noncoherent multiple-antenna communications systems. How many pairwise nonintersecting M_t-dimensional subspaces of an m-dimensional vector space V over a field F can be found, if the generator matrices for the subspaces may contain only symbols from a given finite alphabet A subseteq F? The most important case is when F is the field of complex numbers C; then M_t is the number of antennas. If A = F = GF(q) it is shown that the number of nonintersecting subspaces is at most (q^m-1)/(q^{M_t}-1), and that this bound can be attained if and only if m is divisible by M_t. Furthermore these subspaces remain nonintersecting when ``lifted'' to the complex field. Thus the finite field case is essentially completely solved. In the case when F = C only the case M_t=2 is considered. It is shown that if A is a PSK-configuration, consisting of the 2^r complex roots of unity, the number of nonintersecting planes is at least 2^{r(m-2)} and at most 2^{r(m-1)-1} (the lower bound may in fact be the best that can be achieved).
△ Less
Submitted 26 December, 2003;
originally announced December 2003.
-
Acyclic Digraphs and Eigenvalues of (0,1)-Matrices
Authors:
Brendan D. McKay,
Frederique E. Oggier,
Gordon F. Royle,
N. J. A. Sloane,
Ian M. Wanless,
Herbert S. Wilf
Abstract:
We show that the number of acyclic directed graphs with n labeled vertices is equal to the number of n X n (0,1)-matrices whose eigenvalues are positive real numbers.
We show that the number of acyclic directed graphs with n labeled vertices is equal to the number of n X n (0,1)-matrices whose eigenvalues are positive real numbers.
△ Less
Submitted 27 October, 2003;
originally announced October 2003.