Skip to main content

Showing 1–36 of 36 results for author: Karpuk, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.00542  [pdf, other

    cs.IT

    Secret Sharing for Secure and Private Information Retrieval: A Construction Using Algebraic Geometry Codes

    Authors: Okko Makkonen, David Karpuk, Camilla Hollanti

    Abstract: Private information retrieval (PIR) considers the problem of retrieving a data item from a database or distributed storage system without disclosing any information about which data item was retrieved. Secure PIR complements this problem by further requiring the contents of the data to be kept secure. Privacy and security can be achieved by adding suitable noise to the queries and data using metho… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

    Comments: 19 pages, 1 figure. Extended version of arXiv:2405.18052

  2. arXiv:2405.18052  [pdf, other

    cs.IT

    Algebraic Geometry Codes for Cross-Subspace Alignment in Private Information Retrieval

    Authors: Okko Makkonen, David Karpuk, Camilla Hollanti

    Abstract: A new framework for interference alignment in secure and private information retrieval (PIR) from colluding servers is proposed, generalizing the original cross-subspace alignment (CSA) codes proposed by Jia, Sun, and Jafar. The general scheme is built on algebraic geometry codes and explicit constructions with replicated storage are given over curves of genus zero and one. It is shown that the pr… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

    Comments: 11 pages, 1 figure

  3. arXiv:2405.06121  [pdf, ps, other

    cs.IT

    Secure Distributed Matrix Multiplication with Precomputation

    Authors: Ryann Cartor, Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk, Alex Sprintson

    Abstract: We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We show how to construct polynomial schemes for the outer product partitioning which take advantage of the user's ability to precompute, and provide bounds for our technique. We show that precomputation allows for a red… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  4. arXiv:2305.03465  [pdf, other

    cs.IT

    Modular Polynomial Codes for Secure and Robust Distributed Matrix Multiplication

    Authors: David Karpuk, Razane Tajeddine

    Abstract: We present Modular Polynomial (MP) Codes for Secure Distributed Matrix Multiplication (SDMM). The construction is based on the observation that one can decode certain proper subsets of the coefficients of a polynomial with fewer evaluations than is necessary to interpolate the entire polynomial. We also present Generalized Gap Additive Secure Polynomial (GGASP) codes. Both MP and GGASP codes are s… ▽ More

    Submitted 5 January, 2024; v1 submitted 5 May, 2023; originally announced May 2023.

  5. arXiv:2106.09816  [pdf, ps, other

    cs.IT

    Degree Tables for Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a recently introduced combinatorial tool called the degree table. For a fixed partitioning, minimizing the total communication cost of a polynomial code for SDMM… ▽ More

    Submitted 17 June, 2021; originally announced June 2021.

  6. arXiv:2007.14829  [pdf, ps, other

    cs.IT math.AG math.CO

    Constructing Partial MDS Codes from Reducible Curves

    Authors: Tristram Bogart, Anna-Lena Horlemann-Trautmann, David Karpuk, Alessandro Neri, Mauricio Velasco

    Abstract: We propose reducible algebraic curves as a mechanism to construct Partial MDS (PMDS) codes geometrically. We obtain new general existence results, new explicit constructions and improved estimates on the smallest field sizes over which such codes can exist. Our results are obtained by combining ideas from projective algebraic geometry, combinatorics and probability theory.

    Submitted 29 July, 2020; originally announced July 2020.

    Comments: 25 pages

    MSC Class: 94B27 (Primary) 14H45; 05D40; 11T71 (Secondary)

  7. arXiv:2001.05568  [pdf, other

    cs.IT

    Notes on Communication and Computation in Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. In this paper, we answer the following question: Is it beneficial to offload the computations if security is a concern? We answer this question in the affirmative by showing that by adjusting the parameters in a polynom… ▽ More

    Submitted 8 May, 2020; v1 submitted 15 January, 2020; originally announced January 2020.

  8. Towards Practical Private Information Retrieval from MDS Array Codes

    Authors: Jie Li, David Karpuk, Camilla Hollanti

    Abstract: Private information retrieval (PIR) is the problem of privately retrieving one out of $M$ original files from $N$ severs, i.e., each individual server learns nothing about the file that the user is requesting. Usually, the $M$ files are replicated or encoded by a maximum distance separable (MDS) code and then stored across the $N$ servers. Compared to mere replication, MDS coded servers can signif… ▽ More

    Submitted 11 March, 2020; v1 submitted 23 September, 2019; originally announced September 2019.

    Comments: Accepted for publication in the IEEE Transactions on Communications

  9. arXiv:1812.09962  [pdf, other

    cs.IT

    GASP Codes for Secure Distributed Matrix Multiplication

    Authors: Rafael G. L. D'Oliveira, Salim El Rouayheb, David Karpuk

    Abstract: We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a combinatorial problem on a special type of addition table, which we call the degree table. The codes are based on arithmetic progressions, and are thus named G… ▽ More

    Submitted 11 February, 2020; v1 submitted 24 December, 2018; originally announced December 2018.

  10. arXiv:1812.04142  [pdf, other

    cs.IT cs.CR

    Private Polynomial Computation from Lagrange Encoding

    Authors: Netanel Raviv, David A. Karpuk

    Abstract: Private computation is a generalization of private information retrieval, in which a user is able to compute a function on a distributed dataset without revealing the identity of that function to the servers. In this paper it is shown that Lagrange encoding, a powerful technique for encoding Reed-Solomon codes, enables private computation in many cases of interest. In particular, we present a sche… ▽ More

    Submitted 25 June, 2019; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: To appear in Transactions on Information Forensics and Security

  11. arXiv:1806.08006  [pdf, other

    cs.IT

    Private Information Retrieval from Coded Storage Systems with Colluding, Byzantine, and Unresponsive Servers

    Authors: Razane Tajeddine, Oliver W. Gnilke, David Karpuk, Ragnar Freij-Hollanti, Camilla Hollanti

    Abstract: The problem of Private Information Retrieval (PIR) from coded storage systems with colluding, byzantine, and unresponsive servers is considered. An explicit scheme using an $[n,k]$ Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ unresponsive servers, when $n>k+t+2b+r-1$. This scheme achieves a PIR rate of… ▽ More

    Submitted 5 September, 2018; v1 submitted 20 June, 2018; originally announced June 2018.

    Comments: This is an extended journal version of the ISIT paper arXiv:1802.03731

  12. arXiv:1802.03731  [pdf, ps, other

    cs.IT

    Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers

    Authors: Razane Tajeddine, Oliver W. Gnilke, David Karpuk, Ragnar Freij-Hollanti, Camilla Hollanti

    Abstract: A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and non-responsive servers is presented. Furthermore, the scheme can also be used for symmetric PIR in the same setting. An explicit scheme using an $[n,k]$ generalized Reed-Solomon storage code is designed, protecting against $t$-collusion and handling up to $b$ byzantine and $r$ non-responsive serv… ▽ More

    Submitted 5 September, 2018; v1 submitted 11 February, 2018; originally announced February 2018.

    Comments: This is a preliminary conference version of arxiv:1806.08006

  13. arXiv:1801.02194  [pdf, ps, other

    cs.IT

    Private Computation of Systematically Encoded Data with Colluding Servers

    Authors: David Karpuk

    Abstract: Private Computation (PC), recently introduced by Sun and Jafar, is a generalization of Private Information Retrieval (PIR) in which a user wishes to privately compute an arbitrary function of data stored across several servers. We construct a PC scheme which accounts for server collusion, coded data, and non-linear functions. For data replicated over several possibly colluding servers, our scheme… ▽ More

    Submitted 13 January, 2018; v1 submitted 7 January, 2018; originally announced January 2018.

    Comments: Submitted to IEEE International Symposium on Information Theory 2018. Version 2 fixes some typos and adds some clarifying remarks

  14. arXiv:1712.02850  [pdf, ps, other

    cs.IT

    t-Private Information Retrieval Schemes Using Transitive Codes

    Authors: Ragnar Freij-Hollanti, Oliver W. Gnilke, Camilla Hollanti, Anna-Lena Horlemann-Trautmann, David Karpuk, Ivo Kubjas

    Abstract: This paper presents private information retrieval (PIR) schemes for coded storage with colluding servers, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear codes are constructed and the resulting PIR rate is calculated explicitly. It is shown that codes with transitive automorphism groups yield the highest possible rates obtainable with the proposed… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

  15. arXiv:1701.07636  [pdf, ps, other

    cs.IT

    Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns

    Authors: Razane Tajeddine, Oliver W. Gnilke, David Karpuk, Ragnar Freij-Hollanti, Camilla Hollanti, Salim El Rouayheb

    Abstract: In Private Information Retrieval (PIR), one wants to download a file from a database without revealing to the database which file is being downloaded. Much attention has been paid to the case of the database being encoded across several servers, subsets of which can collude to attempt to deduce the requested file. With the goal of studying the achievable PIR rates in realistic scenarios, we genera… ▽ More

    Submitted 22 June, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: Updated with a corrected statement of Theorem 2

  16. arXiv:1701.07605  [pdf, ps, other

    cs.IT

    Lattice coding for Rician fading channels from Hadamard rotations

    Authors: Alex Karrila, Niko R. Väisänen, David Karpuk, Camilla Hollanti

    Abstract: In this paper, we study lattice coding for Rician fading wireless channels. This is motivated in particular by preliminary studies suggesting the Rician fading model for millimeter-wavelength wireless communications. We restrict to lattice codes arising from rotations of $\mathbb{Z}^n$, and to a single-input single-output (SISO) channel. We observe that several lattice design criteria suggest the… ▽ More

    Submitted 26 January, 2017; originally announced January 2017.

  17. Private Information Retrieval from Coded Databases with Colluding Servers

    Authors: Ragnar Freij-Hollanti, Oliver Gnilke, Camilla Hollanti, David Karpuk

    Abstract: We present a general framework for Private Information Retrieval (PIR) from arbitrary coded databases, that allows one to adjust the rate of the scheme according to the suspected number of colluding servers. If the storage code is a generalized Reed-Solomon code of length n and dimension k, we design PIR schemes which simultaneously protect against t colluding servers and provide PIR rate 1-(k+t-1… ▽ More

    Submitted 16 August, 2017; v1 submitted 7 November, 2016; originally announced November 2016.

  18. arXiv:1609.07723  [pdf, other

    cs.IT

    Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels

    Authors: Mohamed Taoufiq Damir, Alex Karrila, Laia Amorós, Oliver Gnilke, David Karpuk, Camilla Hollanti

    Abstract: The design of lattice coset codes for wiretap channels is considered. Bounds on the eavesdropper's correct decoding probability and information leakage are first revisited. From these bounds, it is explicit that both the information leakage and error probability are controlled by the average flatness factor of the eavesdropper's lattice, which we further interpret geometrically. It is concluded th… ▽ More

    Submitted 30 July, 2020; v1 submitted 25 September, 2016; originally announced September 2016.

    Comments: Partial results were published in ITW'16 (arXiv:1605.00419), ITNAC'16 (arXiv:1609.07666, arXiv:1606.06099), and SPAWC'18

  19. arXiv:1609.07666  [pdf, other

    cs.IT

    Well-Rounded Lattices for Coset Coding in MIMO Wiretap Channels

    Authors: Oliver W. Gnilke, Amaro Barreal, Alex Karrila, Ha Thanh Nguyen Tran, David A. Karpuk, Camilla Hollanti

    Abstract: The concept of well-rounded lattices has recently found important applications in the setting of a fading single-input single-output (SISO) wiretap channel. It has been shown that, under this setup, the property of being well-rounded is critical for minimizing the eavesdropper's probability of correct decoding in lower SNR regimes. The superior performance of coset codes constructed from well-roun… ▽ More

    Submitted 24 September, 2016; originally announced September 2016.

  20. arXiv:1606.06099  [pdf, other

    cs.IT

    Information Bounds and Flatness Factor Approximation for Fading Wiretap MIMO Channels

    Authors: Amaro Barreal, Alex Karrila, David Karpuk, Camilla Hollanti

    Abstract: In this article, the design of secure lattice coset codes for general wireless channels with fading and Gaussian noise is studied. Recalling the eavesdropper's probability and information bounds, a variant of the latter is given from which it is explicitly seen that both quantities are upper bounded by (increasing functions of) the expected flatness factor of the faded lattice related to the eaves… ▽ More

    Submitted 31 July, 2016; v1 submitted 20 June, 2016; originally announced June 2016.

    Comments: 6 pages, 4 figures. Submitted paper

  21. arXiv:1604.07048  [pdf, ps, other

    cs.IT

    Nested Lattice Codes for Vector Perturbation Systems

    Authors: David A. Karpuk, Amaro Barreal, Oliver W. Gnilke, Camilla Hollanti

    Abstract: Vector perturbation is an encoding method for broadcast channels in which the transmitter solves a shortest vector problem in a lattice to create a perturbation vector, which is then added to the data before transmission. In this work, we introduce nested lattice codes into vector perturbation systems, resulting in a strategy which we deem matrix perturbation. We propose design criteria for the ne… ▽ More

    Submitted 24 April, 2016; originally announced April 2016.

  22. arXiv:1601.08112  [pdf, ps, other

    cs.IT

    Channel Pre-Inversion and max-SINR Vector Perturbation for Large-Scale Broadcast Channels

    Authors: David A. Karpuk, Peter Moss

    Abstract: We study channel pre-inversion and vector perturbation (VP) schemes for large-scale broadcast channels, wherein a transmitter has $M$ transmit antennas and is transmitting to $K$ single-antenna non-cooperating receivers. We provide results which predict the capacity of MMSE pre-inversion as $K\rightarrow\infty$. We construct a new VP strategy, max-SINR vector perturbation (MSVP), which maximizes a… ▽ More

    Submitted 29 September, 2016; v1 submitted 29 January, 2016; originally announced January 2016.

  23. arXiv:1507.01098  [pdf, ps, other

    cs.IT

    Perfect Secrecy in Physical Layer Network Coding Systems from Structured Interference

    Authors: David Karpuk, Arsenia Chorti

    Abstract: Physical layer network coding (PNC) has been proposed for next generation networks. In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions we propose upper bounds (UBs) on the achievable perf… ▽ More

    Submitted 1 February, 2016; v1 submitted 4 July, 2015; originally announced July 2015.

  24. arXiv:1505.02903  [pdf, ps, other

    cs.IT

    Locally Diverse Constellations from the Special Orthogonal Group

    Authors: David Karpuk, Camilla Hollanti

    Abstract: To optimize rotated, multidimensional constellations over a single-input, single-output Rayleigh fading channel, a family of rotation matrices is constructed for all dimensions which are a power of 2. This family is a one-parameter subgroup of the group of rotation matrices, and is located using a gradient descent scheme on this Lie group. The parameter defining the family is chosen to optimize th… ▽ More

    Submitted 1 February, 2016; v1 submitted 12 May, 2015; originally announced May 2015.

  25. arXiv:1504.03182  [pdf, ps, other

    cs.IT

    A Low-Complexity Message Recovery Method for Compute-and-Forward Relaying

    Authors: Amaro Barreal, Joonas Pääkkönen, David Karpuk, Camilla Hollanti, Olav Tirkkonen

    Abstract: The Compute-and-Forward relaying strategy achieves high computation rates by decoding linear combinations of transmitted messages at intermediate relays. However, if the involved relays independently choose which combinations of the messages to decode, there is no guarantee that the overall system of linear equations is solvable at the destination. In this article it is shown that, for a Gaussian… ▽ More

    Submitted 20 April, 2015; v1 submitted 13 April, 2015; originally announced April 2015.

    Comments: 5 figures, 5 pages, submitted

  26. arXiv:1502.06007  [pdf, ps, other

    cs.IT math.AG

    Degrees of Freedom and Secrecy in Wireless Relay Networks

    Authors: Arsenia Chorti, Ragnar Freij, David Karpuk

    Abstract: We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defning equations. When the relay and all of the users have the same number of antennas, this a… ▽ More

    Submitted 12 December, 2014; originally announced February 2015.

    Comments: Submitted to MEGA (Effective Methods in Algebraic Geometry) 2015

  27. arXiv:1501.06686  [pdf, ps, other

    cs.IT

    Reduced Complexity Decoding of n x n Algebraic Space-Time Codes

    Authors: Amaro Barreal, Camilla Hollanti, David Karpuk

    Abstract: Algebraic space-time coding allows for reliable data exchange across fading multiple-input multiple-output channels. A powerful technique for decoding space-time codes in Maximum-Likelihood (ML) decoding, but well-performing and widely-used codes such as the Golden code often suffer from high ML-decoding complexity. In this article, a recursive algorithm for decoding general algebraic space-time c… ▽ More

    Submitted 27 January, 2015; originally announced January 2015.

    Comments: Submitted to Workshop on Coding and Cryptography (WCC) 2015

  28. arXiv:1412.6946  [pdf, ps, other

    cs.IT math.NT

    Probability Estimates for Fading and Wiretap Channels from Ideal Class Zeta Functions

    Authors: David Karpuk, Anne-Maria Ernvall-Hytönen, Camilla Hollanti, Emanuele Viterbo

    Abstract: In this paper, new probability estimates are derived for ideal lattice codes from totally real number fields using ideal class Dedekind zeta functions. In contrast to previous work on the subject, it is not assumed that the ideal in question is principal. In particular, it is shown that the corresponding inverse norm sum depends not only on the regulator and discriminant of the number field, but a… ▽ More

    Submitted 22 December, 2014; originally announced December 2014.

    Comments: 24 pages. Extends our earlier arxiv submission arxiv.1303.3475

  29. arXiv:1409.7247  [pdf, other

    cs.IT

    Node Repair for Distributed Storage Systems over Fading Channels

    Authors: David Karpuk, Camilla Hollanti, Amaro Barreal

    Abstract: Distributed storage systems and associated storage codes can efficiently store a large amount of data while ensuring that data is retrievable in case of node failure. The study of such systems, particularly the design of storage codes over finite fields, assumes that the physical channel through which the nodes communicate is error-free. This is not always the case, for example, in a wireless stor… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: To appear in ISITA 2014

  30. arXiv:1409.7244  [pdf, ps, other

    cs.IT

    Multi-Dimensional and Non-Uniform Constellation Optimization via the Special Orthogonal Group

    Authors: David Karpuk, Camilla Hollanti

    Abstract: With the goal of optimizing the CM capacity of a finite constellation over a Rayleigh fading channel, we construct for all dimensions which are a power of 2 families of rotation matrices which optimize a certain objective function controlling the CM capacity. Our construction does not depend on any assumptions about the constellation, dimension, or signal-to-noise ratio. We confirm the benefits of… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: To appear at ITW 2014

  31. arXiv:1409.7222  [pdf, other

    cs.IT

    Hybrid Channel Pre-Inversion and Interference Alignment Strategies

    Authors: David Karpuk, Peter Moss

    Abstract: In this paper we consider strategies for MIMO interference channels which combine the notions of interference alignment and channel pre-inversion. Users collaborate to form data-sharing groups, enabling them to clear interference within a group, while interference alignment is employed to clear interference between groups. To improve the capacity of our schemes at finite SNR, we propose that the g… ▽ More

    Submitted 31 January, 2015; v1 submitted 25 September, 2014; originally announced September 2014.

    Comments: Submitted to ICC 2015

  32. arXiv:1407.0915  [pdf, ps, other

    cs.CR cs.IT

    Strong Secrecy in Wireless Network Coding Systems with M-QAM Modulators

    Authors: Arsenia Chorti, Mehdi M. Molu, David Karpuk, Camilla Hollanti, Alister Burr

    Abstract: We investigate the possibility of developing physical layer network coding (PNC) schemes with embedded strong secrecy based on standard QAM modulators. The proposed scheme employs a triple binning approach at the QAM front-end of the wireless PNC encoders. A constructive example of a strong secrecy encoder is presented when a BPSK and an 8-PAM modulator are employed at the wireless transmitters an… ▽ More

    Submitted 3 July, 2014; originally announced July 2014.

    Comments: submitted to ICCC 2014

  33. arXiv:1405.4375  [pdf, other

    cs.IT math.NT

    Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems

    Authors: Amaro Barreal, Camilla Hollanti, David Karpuk, Hsiao-feng Lu

    Abstract: In a wireless storage system, having to communicate over a fading channel makes repair transmissions prone to physical layer errors. The first approach to combat fading is to utilize the existing optimal space-time codes. However, it was recently pointed out that such codes are in general too complex to decode when the number of helper nodes is bigger than the number of antennas at the newcomer or… ▽ More

    Submitted 17 May, 2014; originally announced May 2014.

    Comments: 5 pages. MTNS 2014

  34. arXiv:1404.6645  [pdf, other

    cs.IT

    Space-Time Storage Codes for Wireless Distributed Storage Systems

    Authors: Camilla Hollanti, David Karpuk, Amaro Barreal, Hsiao-feng Francis Lu

    Abstract: Distributed storage systems (DSSs) have gained a lot of interest recently, thanks to their robustness and scalability compared to single-device storage. Majority of the related research has exclusively concerned the network layer. At the same time, the number of users of, e.g., peer-to-peer (p2p) and device-to-device (d2d) networks as well as proximity based services is growing rapidly, and the mo… ▽ More

    Submitted 26 April, 2014; originally announced April 2014.

    Comments: 6 pages

    MSC Class: 11R04

  35. arXiv:1309.5247  [pdf, other

    cs.IT

    Rotating Non-Uniform and High-Dimensional Constellations Using Geodesic Flow on Lie Groups

    Authors: David A. Karpuk, Camilla Hollanti

    Abstract: We use a numerical algorithm on the Lie group of rotation matrices to obtain rotated constellations for Rayleigh fading channels. Our approach minimizes the union bound for the pairwise error probability to produce rotations optimized for a given signal-to-noise ratio. This approach circumvents explicit parametrization of rotation matrices, which has previously prevented robust numerical methods f… ▽ More

    Submitted 20 September, 2013; originally announced September 2013.

  36. arXiv:1303.3475  [pdf, ps, other

    cs.IT math.NT

    Nonasymptotic Probability Bounds for Fading Channels Exploiting Dedekind Zeta Functions

    Authors: Camilla Hollanti, Emanuele Viterbo, David Karpuk

    Abstract: In this paper, new probability bounds are derived for algebraic lattice codes. This is done by using the Dedekind zeta functions of the algebraic number fields involved in the lattice constructions. In particular, it is shown how to upper bound the error performance of a finite constellation on a Rayleigh fading channel and the probability of an eavesdropper's correct decision in a wiretap channel… ▽ More

    Submitted 18 April, 2013; v1 submitted 14 March, 2013; originally announced March 2013.