Research article Special Issues

Output statistics, equivocation, and state masking

  • Published: 09 June 2025
  • MSC : 94A15, 94A17, 94A24, 94A40

  • Given a discrete memoryless channel and a target distribution on its output alphabet, one wishes to construct a length-$ n $ rate-$ R $ codebook such that the output distribution—computed over a codeword that is chosen uniformly at random—should be close to the $ n $-fold tensor product of the target distribution. Here "close" means that the relative entropy between the output distribution and said $ n $-fold product should be small. We characterize the smallest achievable relative entropy divided by $ n $ as $ n $ tends to infinity. We then demonstrate two applications of this result. The first application is an alternative proof of the achievability of the rate-equivocation region of the wiretap channel. The second application is a new capacity result for communication subject to state masking in the scenario where the decoder has access to channel-state information.

    Citation: Ligong Wang. Output statistics, equivocation, and state masking[J]. AIMS Mathematics, 2025, 10(6): 13151-13165. doi: 10.3934/math.2025590

    Related Papers:

  • Given a discrete memoryless channel and a target distribution on its output alphabet, one wishes to construct a length-$ n $ rate-$ R $ codebook such that the output distribution—computed over a codeword that is chosen uniformly at random—should be close to the $ n $-fold tensor product of the target distribution. Here "close" means that the relative entropy between the output distribution and said $ n $-fold product should be small. We characterize the smallest achievable relative entropy divided by $ n $ as $ n $ tends to infinity. We then demonstrate two applications of this result. The first application is an alternative proof of the achievability of the rate-equivocation region of the wiretap channel. The second application is a new capacity result for communication subject to state masking in the scenario where the decoder has access to channel-state information.



    加载中


    [1] A. D. Wyner, The common information of two independent random variables, IEEE Trans. Inform. Theory, 21 (1975), 163–179. https://doi.org/10.1109/TIT.1975.1055346 doi: 10.1109/TIT.1975.1055346
    [2] T. S. Han, S. Verdú, Approximation theory of output statistics, IEEE Trans. Inform. Theory, 39 (1993), 752–772. https://doi.org/10.1109/18.256486 doi: 10.1109/18.256486
    [3] S. Shamai, S. Verdú, The empirical distribution of good codes, IEEE Trans. Inform. Theory, 43 (1997), 836–846. https://doi.org/10.1109/18.568695 doi: 10.1109/18.568695
    [4] M. Hayashi, General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel, IEEE Trans. Inform. Theory, 52 (2006), 1562–1575. https://doi.org/10.1109/TIT.2006.871040 doi: 10.1109/TIT.2006.871040
    [5] P. Cuff, Distributed channel synthesis, IEEE Trans. Inform. Theory, 59 (2013), 7071–7096. https://doi.org/10.1109/TIT.2013.2279330 doi: 10.1109/TIT.2013.2279330
    [6] P. Cuff, A stronger soft-covering lemma and applications, in 2015 IEEE Conf. Comm. and Network Security, Florence, Italy, 2015. https://doi.org/10.1109/CNS.2015.7346808
    [7] J. Hou, G. Kramer, Effective secrecy: Reliability, confusion and stealth, in Proc. IEEE Int. Symp. Inform. Theory, Honolulu, HI, USA, 2014. https://doi.org/10.1109/ISIT.2014.6874903
    [8] M. Raginsky, I. Sason, Concentration of measure inequalities in information theory, communications, and coding: Third edition, Now Foundations and Trends, 2018.
    [9] Y. Polyanskiy, S. Verdú, Empirical distribution of good channel codes with nonvanishing error probability, IEEE Trans. Inform. Theory, 60 (2014), 5–21. https://doi.org/10.1109/TIT.2013.2284506 doi: 10.1109/TIT.2013.2284506
    [10] A. D. Wyner, The wiretap channel, Bell Syst. Techn. J., 54 (1975), 1355–1387. https://doi.org/10.1002/j.1538-7305.1975.tb02040.x doi: 10.1002/j.1538-7305.1975.tb02040.x
    [11] N. Merhav, S. Shamai, Information rates subject to state masking, IEEE Trans. Inform. Theory, 53 (2007), 2254–2261. https://doi.org/10.1109/TIT.2007.896860 doi: 10.1109/TIT.2007.896860
    [12] L. Wang, G. W. Wornell, Communication over discrete channels subject to state obfuscation, IEEE Trans. Inform. Theory, 70 (2024), 8455–8466. https://doi.org/10.1109/TIT.2024.3432573 doi: 10.1109/TIT.2024.3432573
    [13] T. M. Cover, J. A. Thomas, Elements of information theory, 2 Eds., John Wiley & Sons, New York, 2006.
    [14] I. Csiszár, J. Körner, Broadcast channels with confidential messages, IEEE Trans. Inform. Theory, 24 (1978), 339–348. https://doi.org/10.1109/TIT.1978.1055892 doi: 10.1109/TIT.1978.1055892
    [15] S. I. Gel'fand, M. S. Pinsker, Coding for channels with random parameters, Prob. Contr. Inform. Theory, 9 (1980), 19–31.
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(612) PDF downloads(28) Cited by(0)

Article outline

Figures and Tables

Figures(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog