Skip to main content

Showing 1–50 of 71 results for author: Langberg, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.19773  [pdf, ps, other

    cs.IT

    Sliding Window Adversarial Channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate, Yihan Zhang

    Abstract: In an arbitrarily varying channel (AVC), the channel has a state which is under the control of an adversarial jammer and the corresponding capacities are often functions of the "power" constraints on the transmitter and jammer. In this paper we propose a model in which the constraints must hold almost surely over contiguous subsequences of the codeword and state, which we call a sliding window con… ▽ More

    Submitted 28 April, 2025; originally announced April 2025.

    Comments: Submitted manuscript accepted to ISIT 2025

    MSC Class: 94A40

  2. arXiv:2501.14064  [pdf, ps, other

    cs.IT

    Switched Feedback for the Multiple-Access Channel

    Authors: Oliver Kosut, Michael Langberg, Michelle Effros

    Abstract: A mechanism called switched feedback is introduced; under switched feedback, each channel output goes forward to the receiver(s) or back to the transmitter(s) but never both. By studying the capacity of the Multiple-Access Channel (MAC) with switched feedback, this work investigates the benefits of feedback, seeking to maximize that benefit under reliable and unreliable feedback scenarios. The stu… ▽ More

    Submitted 29 April, 2025; v1 submitted 23 January, 2025; originally announced January 2025.

    Comments: To appear at the 2025 IEEE International Symposium on Information Theory

  3. arXiv:2501.13278  [pdf, ps, other

    cs.IT

    On Subset Retrieval and Group Testing Problems with Differential Privacy Constraints

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: This paper focuses on the design and analysis of privacy-preserving techniques for group testing and infection status retrieval. Our work is motivated by the need to provide accurate information on the status of disease spread among a group of individuals while protecting the privacy of the infection status of any single individual involved. The paper is motivated by practical scenarios, such as c… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

  4. arXiv:2501.05593  [pdf, other

    cs.IT math.CO

    Bounds on Box Codes

    Authors: Michael Langberg, Moshe Schwartz, Itzhak Tamo

    Abstract: Let $n_q(M,d)$ be the minimum length of a $q$-ary code of size $M$ and minimum distance $d$. Bounding $n_q(M,d)$ is a fundamental problem that lies at the heart of coding theory. This work considers a generalization $n^\bx_q(M,d)$ of $n_q(M,d)$ corresponding to codes in which codewords have \emph{protected} and \emph{unprotected} entries; where (analogs of) distance and of length are measured with… ▽ More

    Submitted 9 January, 2025; originally announced January 2025.

  5. arXiv:2407.02949  [pdf, other

    cs.IT

    Competitive Analysis of Arbitrary Varying Channels

    Authors: Michael Langberg, Oron Sabag

    Abstract: Arbitrary varying channels (AVC) are used to model communication settings in which a channel state may vary arbitrarily over time. Their primary objective is to circumvent statistical assumptions on channel variation. Traditional studies on AVCs optimize rate subject to the worst-case state sequence. While this approach is resilient to channel variations, it may result in low rates for state seque… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  6. arXiv:2407.01703  [pdf, other

    cs.IT

    Characterizing positive-rate key-cast (and multicast network coding) with eavesdropping nodes

    Authors: Michael Langberg, Michelle Effros

    Abstract: In multi-source multi-terminal key-dissemination, here called ``key-cast,'' introduced by the authors in [ITW2022], network nodes hold independent random bits, and one seeks a communication scheme that allows all terminal nodes to share a secret key K. The work at hand addresses positive (albeit, arbitrarily small) rate key-cast under the security requirement that no single non-terminal network no… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  7. arXiv:2404.06324  [pdf, other

    cs.NI cs.AI cs.LG

    Dynamic D2D-Assisted Federated Learning over O-RAN: Performance Analysis, MAC Scheduler, and Asymmetric User Selection

    Authors: Payam Abdisarabshali, Kwang Taik Kim, Michael Langberg, Weifeng Su, Seyyedali Hosseinalipour

    Abstract: Existing studies on federated learning (FL) are mostly focused on system orchestration for static snapshots of the network and making static control decisions (e.g., spectrum allocation). However, real-world wireless networks are susceptible to temporal variations of wireless channel capacity and users' datasets. In this paper, we incorporate multi-granular system dynamics (MSDs) into FL, includin… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: 120 pages, 13 figures

  8. arXiv:2401.15495  [pdf, ps, other

    cs.IT

    Nobody Expects a Differential Equation: Minimum Energy-Per-Bit for the Gaussian Relay Channel with Rank-1 Linear Relaying

    Authors: Oliver Kosut, Michelle Effros, Michael Langberg

    Abstract: Motivated by the design of low-complexity low-power coding solutions for the Gaussian relay channel, this work presents an upper bound on the minimum energy-per-bit achievable on the Gaussian relay channel using rank-1 linear relaying. Our study addresses high-dimensional relay codes and presents bounds that outperform prior known bounds using 2-dimensional schemes. A novelty of our analysis ties… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: Submitted to the IEEE International Symposium on Information Theory, 2024. 13 pages, 1 figure

  9. arXiv:2306.07814  [pdf, ps, other

    cs.IT

    Competitive Channel-Capacity

    Authors: Michael Langberg, Oron Sabag

    Abstract: We consider communication over channels whose statistics are not known in full, but can be parameterized as a finite family of memoryless channels. A typical approach to address channel uncertainty is to design codes for the worst channel in the family, resulting in the well-known compound channel capacity. Although this approach is robust, it may suffer a significant loss of performance if the ca… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  10. arXiv:2305.06340  [pdf, ps, other

    cs.IT

    Perfect vs. Independent Feedback in the Multiple-Access Channel

    Authors: Oliver Kosut, Michelle Effros, Michael Langberg

    Abstract: The multiple access channel (MAC) capacity with feedback is considered under feedback models designed to tease out which factors contribute to the MAC feedback capacity benefit. Comparing the capacity of a MAC with ``perfect'' feedback, which causally delivers to the transmitters the true channel output, to that of a MAC with ``independent'' feedback, which causally delivers to the transmitters an… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: 9 pages, to appear at the International Symposium on Information Theory 2023

  11. arXiv:2302.03524  [pdf, other

    cs.IT

    Multiple Key-cast over Networks

    Authors: Michael Langberg, Michelle Effros

    Abstract: The multicast key-dissemination problem over noiseless networks, introduced by Langberg and Effros [ITW 2022], here called the ``key-cast'' problem, captures the task of disseminating a shared secret random key to a set of terminals over a given network. Unlike traditional communication, where messages must be delivered from source to destination(s) unchanged, key-cast is more flexible since key-c… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  12. arXiv:2205.06708  [pdf, ps, other

    cs.IT

    The Capacity of Causal Adversarial Channels

    Authors: Yihan Zhang, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We characterize the capacity for the discrete-time arbitrarily varying channel with discrete inputs, outputs, and states when (a) the encoder and decoder do not share common randomness, (b) the input and state are subject to cost constraints, (c) the transition matrix of the channel is deterministic given the state, and (d) at each time step the adversary can only observe the current and past chan… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

  13. arXiv:2202.04988  [pdf, other

    cs.IT

    Group Testing on General Set-Systems

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: Group testing is one of the fundamental problems in coding theory and combinatorics in which one is to identify a subset of contaminated items from a given ground set. There has been renewed interest in group testing recently due to its applications in diagnostic virology, including pool testing for the novel coronavirus. The majority of existing works on group testing focus on the \emph{uniform}… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 7 pages, 1 figure

  14. arXiv:2202.03918  [pdf, other

    cs.IT

    Network Coding Multicast Key-Capacity

    Authors: Michael Langberg, Michelle Effros

    Abstract: For a multi-source multi-terminal noiseless network, the key-dissemination problem involves the task of multicasting a secret key K from the network sources to its terminals. As in secure multicast network-coding, in the key-dissemination problem the source nodes have access to independent randomness and, as the network is noiseless, the resulting key K is a function of the sources' information. H… ▽ More

    Submitted 19 May, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

  15. arXiv:2202.01878  [pdf, other

    cs.IT

    On the Benefit of Cooperation in Relay Networks

    Authors: Oliver Kosut, Michelle Effros, Michael Langberg

    Abstract: This work addresses the cooperation facilitator (CF) model, in which network nodes coordinate through a rate limited communication device. For independent multiple-access channel (MAC) encoders, the CF model is known to show significant rate benefits, even when the rate of cooperation is negligible. Specifically, the benefit in MAC sum-rate, as a function of the cooperation rate $C_{CF}$, sometime… ▽ More

    Submitted 3 February, 2022; originally announced February 2022.

    Comments: Full version of a paper submitted to ISIT 2022. 9 pages, 3 figures

  16. arXiv:2102.02608  [pdf, ps, other

    cs.IT

    Minimizing the alphabet size in codes with restricted error sets

    Authors: Mira Gonen, Michael Langberg, Alex Sprintson

    Abstract: This paper focuses on error-correcting codes that can handle a predefined set of specific error patterns. The need for such codes arises in many settings of practical interest, including wireless communication and flash memory systems. In many such settings, a smaller field size is achievable than that offered by MDS and other standard codes. We establish a connection between the minimum alphabet… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

  17. arXiv:2102.01247  [pdf, other

    cs.IT

    Every Bit Counts: Second-Order Analysis of Cooperation in the Multiple-Access Channel

    Authors: Oliver Kosut, Michelle Effros, Michael Langberg

    Abstract: The work at hand presents a finite-blocklength analysis of the multiple access channel (MAC) sum-rate under the cooperation facilitator (CF) model. The CF model, in which independent encoders coordinate through an intermediary node, is known to show significant rate benefits, even when the rate of cooperation is limited. We continue this line of study for cooperation rates which are sub-linear in… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.

    Comments: Full version of a paper submitted to ISIT 2021

  18. arXiv:2101.12236  [pdf, other

    cs.IT

    Beyond Capacity: The Joint Time-Rate Region

    Authors: Michael Langberg, Michelle Effros

    Abstract: The traditional notion of capacity studied in the context of memoryless network communication builds on the concept of block-codes and requires that, for sufficiently large blocklength n, all receiver nodes simultaneously decode their required information after n channel uses. In this work, we generalize the traditional capacity region by exploring communication rates achievable when some receiver… ▽ More

    Submitted 28 January, 2021; originally announced January 2021.

  19. arXiv:2005.10315  [pdf, other

    cs.IT

    Edge removal in undirected networks

    Authors: Michael Langberg, Michelle Effros

    Abstract: The edge-removal problem asks whether the removal of a $λ$-capacity edge from a given network can decrease the communication rate between source-terminal pairs by more than $λ$. In this short manuscript, we prove that for undirected networks, removing a $λ$-capacity edge decreases the rate by $O(λ)$. Through previously known reductive arguments, here newly applied to undirected networks, our resul… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

  20. arXiv:2005.06947  [pdf, ps, other

    cs.IT math.CO

    Minimizing the alphabet size of erasure codes with restricted decoding sets

    Authors: Mira Gonen, Ishay Haviv, Michael Langberg, Alex Sprintson

    Abstract: A Maximum Distance Separable code over an alphabet $F$ is defined via an encoding function $C:F^k \rightarrow F^n$ that allows to retrieve a message $m \in F^k$ from the codeword $C(m)$ even after erasing any $n-k$ of its symbols. The minimum possible alphabet size of general (non-linear) MDS codes for given parameters $n$ and $k$ is unknown and forms one of the central open problems in coding the… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: 7 pages, 1 figure

  21. arXiv:2003.05575  [pdf, other

    cs.DC cs.CC cs.DB

    Topology Dependent Bounds For FAQs

    Authors: Michael Langberg, Shi Li, Sai Vikneshwar Mani Jayaraman, Atri Rudra

    Abstract: In this paper, we prove topology dependent bounds on the number of rounds needed to compute Functional Aggregate Queries (FAQs) studied by Abo Khamis et al. [PODS 2016] in a synchronous distributed network under the model considered by Chattopadhyay et al. [FOCS 2014, SODA 2017]. Unlike the recent work on computing database queries in the Massively Parallel Computation model, in the model of Chatt… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: A conference version was presented at PODS 2019

  22. arXiv:2002.00781  [pdf, other

    cs.IT

    Towards an Operational Definition of Group Network Codes

    Authors: Fei Wei, Michael Langberg, Michelle Effros

    Abstract: Group network codes are a generalization of linear codes that have seen several studies over the last decade. When studying network codes, operations performed at internal network nodes called local encoding functions, are of significant interest. While local encoding functions of linear codes are well understood (and of operational significance), no similar operational definition exists for group… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  23. arXiv:1911.10449  [pdf, other

    cs.IT

    Negligible Cooperation: Contrasting the Maximal- and Average-Error Cases

    Authors: Parham Noorzad, Michael Langberg, Michelle Effros

    Abstract: In communication networks, cooperative strategies are coding schemes where network nodes work together to improve network performance metrics such as the total rate delivered across the network. This work studies encoder cooperation in the setting of a discrete multiple access channel (MAC) with two encoders and a single decoder. A network node, here called the cooperation facilitator (CF), that i… ▽ More

    Submitted 23 November, 2019; originally announced November 2019.

    Comments: 30 pages, 1 figure. This article supersedes arXiv:1607.07024 and arXiv:1801.03655

  24. arXiv:1907.03522  [pdf, ps, other

    cs.IT

    Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys

    Authors: Debaditya Chaudhuri, Michael Langberg, Michelle Effros

    Abstract: It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to $z$ network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate is well understood. Computing the secure multicast rate, or even the secure unicast rate, in the more general setting in which all network nodes ma… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

  25. arXiv:1907.01133  [pdf, other

    cs.IT

    A Local Perspective on the Edge Removal Problem

    Authors: Fei Wei, Michael Langberg, Michelle Effros

    Abstract: The edge removal problem studies the loss in network coding rates that results when a network communication edge is removed from a given network. It is known, for example, that in networks restricted to linear coding schemes and networks restricted to Abelian group codes, removing an edge e* with capacity Re* reduces the achievable rate on each source by no more than Re*. In this work, we seek to… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  26. arXiv:1805.03319  [pdf, other

    cs.IT

    Quadratically Constrained Channels with Causal Adversaries

    Authors: Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-$n$ codeword $\mathbf{x}=x_1,...,x_n$ through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, an adversarial jammer Ja… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 80 pages, ISIT 2018

  27. arXiv:1802.04719  [pdf, ps, other

    cs.IT cs.DM math.CO

    The Birthday Problem and Zero-Error List Codes

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg, Victoria Kostina

    Abstract: As an attempt to bridge the gap between the probabilistic world of classical information theory and the combinatorial world of zero-error information theory, this paper studies the performance of randomly generated codebooks over discrete memoryless channels under a zero-error list-decoding constraint. This study allows the application of tools from one area to the other. Furthermore, it leads to… ▽ More

    Submitted 8 December, 2018; v1 submitted 13 February, 2018; originally announced February 2018.

    Comments: Extended version of paper presented at ISIT 2017 in Aachen

  28. arXiv:1801.03655  [pdf, other

    cs.IT

    Can Negligible Cooperation Increase Network Capacity? The Average-Error Case

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: In communication networks, cooperative strategies are coding schemes where network nodes work together to improve network performance metrics such as sum-rate. This work studies encoder cooperation in the setting of a discrete multiple access channel with two encoders and a single decoder. A node in the network that is connected to both encoders via rate-limited links, referred to as the cooperati… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

    Comments: 20 pages, 1 figure. To be submitted to ISIT '18

  29. arXiv:1707.05869  [pdf, other

    cs.IT

    The Benefit of Encoder Cooperation in the Presence of State Information

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: In many communication networks, the availability of channel state information at various nodes provides an opportunity for network nodes to work together, or "cooperate." This work studies the benefit of cooperation in the multiple access channel with a cooperation facilitator, distributed state information at the encoders, and full state information available at the decoder. Under various causali… ▽ More

    Submitted 18 July, 2017; originally announced July 2017.

    Comments: Extended version of paper presented at ISIT 2017 in Aachen. 20 pages, 1 figure

  30. arXiv:1701.01043  [pdf, ps, other

    cs.IT cs.DM math.CO

    Non-linear Cyclic Codes that Attain the Gilbert-Varshamov Bound

    Authors: Ishay Haviv, Michael Langberg, Moshe Schwartz, Eitan Yaakobi

    Abstract: We prove that there exist non-linear binary cyclic codes that attain the Gilbert-Varshamov bound.

    Submitted 4 January, 2017; originally announced January 2017.

  31. arXiv:1610.01287  [pdf, other

    cs.IT

    Sufficiently Myopic Adversaries are Blind

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg

    Abstract: In this work we consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is {\em myopic}. Roughly speaking, for blocklength $n$, the codeword $X^n$ transmitted by Alice is corrupted by James who must base his adversarial decisions (of which locations of $X^n$ to corrupt and how to corrupt t… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

    Comments: 18 pages

  32. arXiv:1608.03313  [pdf, ps, other

    cs.CC cs.DC

    Tight Network Topology Dependent Bounds on Rounds of Communication

    Authors: Arkadev Chattopadhyay, Michael Langberg, Shi Li, Atri Rudra

    Abstract: We prove tight network topology dependent bounds on the round complexity of computing well studied $k$-party functions such as set disjointness and element distinctness. Unlike the usual case in the CONGEST model in distributed computing, we fix the function and then vary the underlying network topology. This complements the recent such results on total communication that have received some attent… ▽ More

    Submitted 1 November, 2016; v1 submitted 10 August, 2016; originally announced August 2016.

    Comments: 31 pages, 2 figures

  33. arXiv:1607.07024  [pdf, other

    cs.IT

    On the Capacity Advantage of a Single Bit

    Authors: Michael Langberg, Michelle Effros

    Abstract: In this work we study the capacity advantage achieved by adding a single bit of communication -- not a link of capacity 1 but a single bit over all time -- to a memoryless network. Specifically, we present a memoryless network in which adding a single bit of communication strictly increases the capacity region.

    Submitted 24 July, 2016; originally announced July 2016.

    Comments: 6 pages

  34. arXiv:1602.02384  [pdf, other

    cs.IT cs.CR

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communicating a message $m$ in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to $pn$ bits, out of $n$ transmitted bits $(x_1,\ldots,x_n)$. The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit $x_i$ depends on his observations $(x_1,\ldots,x_i)$ was recently chara… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 21 pages, 4 figures, extended draft of submission to ISIT 2016

  35. arXiv:1602.00276  [pdf, other

    cs.IT

    The Capacity of Online (Causal) $q$-ary Error-Erasure Channels

    Authors: Zitan Chen, Sidharth Jaggi, Michael Langberg

    Abstract: In the $q$-ary online (or "causal") channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword $\mathbf{x} =(x_1,\ldots,x_n) \in \{0,1,\ldots,q-1\}^n$ symbol by symbol via a channel limited to at most $pn$ errors and/or $p^{*} n$ erasures. The channel is "online" in the sense that at the $i$th step of communication the channel decides whether to corrupt… ▽ More

    Submitted 31 January, 2016; originally announced February 2016.

    Comments: This is a new version of the binary case, which can be found at arXiv:1412.6376

  36. The Unbounded Benefit of Encoder Cooperation for the $k$-user MAC

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: Cooperation strategies allow communication devices to work together to improve network capacity. Consider a network consisting of a $k$-user multiple access channel (MAC) and a node that is connected to all $k$ encoders via rate-limited bidirectional links, referred to as the "cooperation facilitator" (CF). Define the cooperation benefit as the sum-capacity gain resulting from the communication be… ▽ More

    Submitted 30 September, 2016; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: 46 pages, 4 figures. Submitted to the IEEE Transactions on Information Theory. This article supersedes arXiv:1504.04432 and arXiv:1508.03349

  37. Can Negligible Cooperation Increase Network Reliability?

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: In network cooperation strategies, nodes work together with the aim of increasing transmission rates or reliability. This paper demonstrates that enabling cooperation between the transmitters of a two-user multiple access channel, via a cooperation facilitator that has access to both messages, always results in a network whose maximal- and average-error sum-capacities are the same---even when thos… ▽ More

    Submitted 30 September, 2016; v1 submitted 21 January, 2016; originally announced January 2016.

    Comments: 27 pages, 3 figures. Submitted to the IEEE Transactions on Information Theory

  38. arXiv:1508.03349  [pdf, ps, other

    cs.IT

    The Multivariate Covering Lemma and its Converse

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: The multivariate covering lemma states that given a collection of $k$ codebooks, each of sufficiently large cardinality and independently generated according to one of the marginals of a joint distribution, one can always choose one codeword from each codebook such that the resulting $k$-tuple of codewords is jointly typical with respect to the joint distribution. We give a proof of this lemma for… ▽ More

    Submitted 21 January, 2016; v1 submitted 13 August, 2015; originally announced August 2015.

    Comments: 10 pages

  39. arXiv:1505.07515  [pdf, other

    cs.IT cs.CR

    Communication Efficient Secret Sharing

    Authors: Wentao Huang, Michael Langberg, Joerg Kliewer, Jehoshua Bruck

    Abstract: A secret sharing scheme is a method to store information securely and reliably. Particularly, in a threshold secret sharing scheme, a secret is encoded into $n$ shares, such that any set of at least $t_1$ shares suffice to decode the secret, and any set of at most $t_2 < t_1$ shares reveal no information about the secret. Assuming that each party holds a share and a user wishes to decode the secre… ▽ More

    Submitted 1 April, 2016; v1 submitted 27 May, 2015; originally announced May 2015.

    Comments: submitted to the IEEE Transactions on Information Theory. New references and a new construction added

  40. arXiv:1504.04930  [pdf, other

    cs.IT

    Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

    Authors: Wentao Huang, Michael Langberg, Joerg Kliewer

    Abstract: We show that solving a multiple-unicast network coding problem can be reduced to solving a single-unicast network error correction problem, where an adversary may jam at most a single edge in the network. Specifically, we present an efficient reduction that maps a multiple-unicast network coding instance to a network error correction instance while preserving feasibility. The reduction holds for b… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

    Comments: ISIT 2015. arXiv admin note: text overlap with arXiv:1410.1905

  41. arXiv:1504.04432  [pdf, other

    cs.IT

    On the Cost and Benefit of Cooperation (Extended Version)

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg

    Abstract: In a cooperative coding scheme, network nodes work together to achieve higher transmission rates. To obtain a better understanding of cooperation, we consider a model in which two transmitters send rate-limited descriptions of their messages to a "cooperation facilitator", a node that sends back rate-limited descriptions of the pair to each transmitter. This model includes the conferencing encoder… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

    Comments: 15 pages, 3 figures. To be presented at ISIT 2015

  42. arXiv:1412.6376  [pdf, other

    cs.IT

    A characterization of the capacity of online (causal) binary channels

    Authors: Zitan Chen, Sidharth Jaggi, Michael Langberg

    Abstract: In the binary online (or "causal") channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword $\mathbf{x} =(x_1,\ldots,x_n) \in \{0,1\}^n$ bit by bit via a channel limited to at most $pn$ corruptions. The channel is "online" in the sense that at the $i$th step of communication the channel decides whether to corrupt the $i$th bit or not based on its view… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

  43. arXiv:1410.3542  [pdf, ps, other

    cs.IT

    Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

    Authors: Eyal En Gad, Yue Li, Joerg Kliewer, Michael Langberg, Anxiao Jiang, Jehoshua Bruck

    Abstract: We propose efficient coding schemes for two communication settings: 1. asymmetric channels, and 2. channels with an informed encoder. These settings are important in non-volatile memories, as well as optical and broadcast communication. The schemes are based on non-linear polar codes, and they build on and improve recent work on these settings. In asymmetric channels, we tackle the exponential sto… ▽ More

    Submitted 28 December, 2015; v1 submitted 13 October, 2014; originally announced October 2014.

    Comments: Submitted to IEEE Transactions on Information Theory. Partially presented at ISIT 2014

  44. arXiv:1410.1905  [pdf, other

    cs.IT

    Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast

    Authors: Wentao Huang, Tracey Ho, Michael Langberg, Joerg Kliewer

    Abstract: We study the problem of communicating over a single-source single-terminal network in the presence of an adversary that may jam a single link of the network. If any one of the edges can be jammed, the capacity of such networks is well understood and follows directly from the connection between the minimum cut and maximum flow in single-source single- terminal networks. In this work we consider net… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

  45. arXiv:1402.3898  [pdf, other

    cs.IT

    Graph Theory versus Minimum Rank for Index Coding

    Authors: Karthikeyan Shanmugam, Alexandros G. Dimakis, Michael Langberg

    Abstract: We obtain novel index coding schemes and show that they provably outperform all previously known graph theoretic bounds proposed so far. Further, we establish a rather strong negative result: all known graph theoretic bounds are within a logarithmic factor from the chromatic number. This is in striking contrast to minrank since prior work has shown that it can outperform the chromatic number by a… ▽ More

    Submitted 17 February, 2014; originally announced February 2014.

    Comments: 8 pages, 2 figures. Submitted to ISIT 2014

  46. arXiv:1401.7085  [pdf, other

    cs.IT

    Reverse Edge Cut-Set Bounds for Secure Network Coding

    Authors: Wentao Huang, Tracey Ho, Michael Langberg, Joerg Kliewer

    Abstract: We consider the problem of secure communication over a network in the presence of wiretappers. We give a new cut-set bound on secrecy capacity which takes into account the contribution of both forward and backward edges crossing the cut, and the connectivity between their endpoints in the rest of the network. We show the bound is tight on a class of networks, which demonstrates that it is not poss… ▽ More

    Submitted 27 January, 2014; originally announced January 2014.

  47. arXiv:1401.6498  [pdf, other

    cs.IT

    On the Power of Cooperation: Can a Little Help a Lot? (Extended Version)

    Authors: Parham Noorzad, Michelle Effros, Michael Langberg, Tracey Ho

    Abstract: In this paper, we propose a new cooperation model for discrete memoryless multiple access channels. Unlike in prior cooperation models (e.g., conferencing encoders), where the transmitters cooperate directly, in this model the transmitters cooperate through a larger network. We show that under this indirect cooperation model, there exist channels for which the increase in sum-capacity resulting fr… ▽ More

    Submitted 27 April, 2014; v1 submitted 25 January, 2014; originally announced January 2014.

    Comments: Extended version of a paper submitted to ISIT 2014 (10 pages, 3 figures)

  48. arXiv:1307.6779  [pdf, ps, other

    cs.IT

    Zero vs. epsilon Error in Interference Channels

    Authors: Ilia Levi, Dan Vilenchik, Michael Langberg, Michelle Effros

    Abstract: Traditional studies of multi-source, multi-terminal interference channels typically allow a vanishing probability of error in communication. Motivated by the study of network coding, this work addresses the task of quantifying the loss in rate when insisting on zero error communication in the context of interference channels.

    Submitted 28 July, 2013; v1 submitted 25 July, 2013; originally announced July 2013.

  49. arXiv:1303.0141  [pdf, other

    cs.IT

    Routing for Security in Networks with Adversarial Nodes

    Authors: Pak Hou Che, Minghua Chen, Tracey Ho, Sidharth Jaggi, Michael Langberg

    Abstract: We consider the problem of secure unicast transmission between two nodes in a directed graph, where an adversary eavesdrops/jams a subset of nodes. This adversarial setting is in contrast to traditional ones where the adversary controls a subset of links. In particular, we study, in the main, the class of routing-only schemes (as opposed to those allowing coding inside the network). Routing-only s… ▽ More

    Submitted 1 March, 2013; originally announced March 2013.

  50. arXiv:1301.5359  [pdf, other

    cs.IT cs.DM

    Local Graph Coloring and Index Coding

    Authors: Karthikeyan Shanmugam, Alexandros G. Dimakis, Michael Langberg

    Abstract: We present a novel upper bound for the optimal index coding rate. Our bound uses a graph theoretic quantity called the local chromatic number. We show how a good local coloring can be used to create a good index code. The local coloring is used as an alignment guide to assign index coding vectors from a general position MDS code. We further show that a natural LP relaxation yields an even stronger… ▽ More

    Submitted 8 February, 2013; v1 submitted 22 January, 2013; originally announced January 2013.

    Comments: 14 Pages, 3 Figures; A conference version submitted to ISIT 2013; typos corrected