Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Yagi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.11097  [pdf, other

    cs.IT

    Optimum Achievable Rates in Two Random Number Generation Problems with $f$-Divergences Using Smooth Rényi Entropy

    Authors: Ryo Nomura, Hideki Yagi

    Abstract: Two typical fixed-length random number generation problems in information theory are considered for general sources. One is the source resolvability problem and the other is the intrinsic randomness problem. In each of these problems, the optimum achievable rate with respect to the given approximation measure is one of our main concerns and has been characterized using two different information qu… ▽ More

    Submitted 12 May, 2024; v1 submitted 17 April, 2024; originally announced April 2024.

  2. arXiv:2301.12526  [pdf, other

    cs.IT cs.CR

    Outer Bounds on the CEO Problem with Privacy Constraints

    Authors: Vamoua Yachongka, Hideki Yagi, Hideki Ochiai

    Abstract: We investigate the rate-distortion-leakage region of the Chief Executive Officer (CEO) problem with a passive eavesdropper and privacy constraints, considering a general distortion measure. While an inner bound directly follows from the previous work, an outer bound is newly developed in this paper. To derive this bound, we introduce a new lemma tailored for analyzing privacy constraints. As a spe… ▽ More

    Submitted 1 January, 2024; v1 submitted 29 January, 2023; originally announced January 2023.

    Comments: 14 pages, 4 figures

  3. arXiv:2208.10478  [pdf, other

    cs.IT cs.CR

    Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

    Authors: Vamoua Yachongka, Hideki Yagi, Hideki Ochiai

    Abstract: Secret-key agreement based on biometric or physical identifiers is a promising security protocol for authenticating users or devices with small chips due to its lightweight security. In previous studies, the fundamental limits of such a protocol were analyzed, and the results showed that two auxiliary random variables were involved in the capacity region expressions. However, with these two auxili… ▽ More

    Submitted 14 November, 2022; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: A shorter version of this work is accepted to be presented at ITW 2022

  4. Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

    Authors: Vamoua Yachongka, Hideki Yagi

    Abstract: We propose a biometric identification system where the chosen- and generated-secret keys are used simultaneously, and investigate its fundamental limits from information-theoretic perspectives. The system consists of two phases: enrollment and identification phases. In the enrollment phase, for each user, the encoder uses a secret key, which is chosen independently, and the biometric identifier to… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: This paper is submitted to IEICE Trans. Fundamentals

  5. arXiv:2202.10018  [pdf, other

    cs.IT cs.CR

    Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

    Authors: Vamoua Yachongka, Hideki Yagi, Yasutada Oohama

    Abstract: We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there i… ▽ More

    Submitted 28 June, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: This work is presented at ISIT 2022

  6. arXiv:2105.10135  [pdf, other

    cs.IT

    Unified Expression of Utility-Privacy Trade-off in Privacy-Constrained Source Coding

    Authors: Naruki Shinohara, Hideki Yagi

    Abstract: Privacy-constrained source coding problems have become increasingly important recently, and the utility-privacy trade-off has been investigated for various systems. As pioneering work, Yamamoto (1983) found theoretical limits of the coding rate, privacy and utility in two cases; (i) both public and private information is encoded and (ii) only public information is encoded. However, the theoretical… ▽ More

    Submitted 9 May, 2022; v1 submitted 21 May, 2021; originally announced May 2021.

    Comments: 13 pages, 3 figure, 3 tables, An extended version of the paper submitted to ISITA2022

  7. Biometric Identification Systems With Noisy Enrollment for Gaussian Source

    Authors: Vamoua Yachongka, Hideki Yagi, Yasutada Oohama

    Abstract: In the present paper, we investigate the fundamental trade-off of identification, secrecy, storage, and privacy-leakage rates in biometric identification systems for hidden or remote Gaussian sources. We introduce a technique for deriving the capacity region of these rates by converting the system to one where the data flow is in one-way direction. Also, we provide numerical calculations of three… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  8. Fundamental Limits of Biometric Identification Systems with Strong Secrecy

    Authors: Vamoua Yachongka, Hideki Yagi

    Abstract: The fundamental limits of biometric identification systems under a strong secrecy criterion are investigated. In the previous studies of this scenario, the fundamental trade-off among secrecy, template, privacy- and secrecy-leakages has been revealed in the case where there is only one user, while the case of multiple users has not been discussed yet. In this study, we consider the system with exp… ▽ More

    Submitted 21 October, 2020; v1 submitted 12 February, 2020; originally announced February 2020.

    Comments: Some critical errors are found in the proofs of the main results, so we want to withdraw this paper. Thank you

  9. arXiv:1905.03598  [pdf, other

    cs.IT

    Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment

    Authors: Vamoua Yachongka, Hideki Yagi

    Abstract: We study the fundamental limits of biometric identification systems with chosen secret from an information theoretic perspective. Ignatenko and Willems (2015) characterized the capacity region of identification, secrecy, and privacy-leakage rates of the system provided that the enrollment channel is noiseless. In the enrollment process, however, it is highly considered that noise occurs when bio-d… ▽ More

    Submitted 17 February, 2020; v1 submitted 7 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1902.01663

  10. Identification, Secrecy, Template, and Privacy-Leakage of Biometric Identification System Under Noisy Enrollment

    Authors: Vamoua Yachongka, Hideki Yagi

    Abstract: In this study, we investigate fundamental trade-off among identification, secrecy, template, and privacy-leakage rates in biometric identification systems. Ignatenko and Willems (2015) studied this system assuming that the channel in the enrollment process of the system is noiseless and they did not consider the template rate. In the enrollment process, however, it is highly considered that noise… ▽ More

    Submitted 21 February, 2022; v1 submitted 5 February, 2019; originally announced February 2019.

    Comments: This is an extended version of our paper presented at ISIT2019

  11. arXiv:1810.07863  [pdf, ps, other

    cs.IT

    Optimum Overflow Thresholds in Variable-Length Source Coding Allowing Non-Vanishing Error Probability

    Authors: Ryo Nomura, Hideki Yagi

    Abstract: The variable-length source coding problem allowing the error probability up to some constant is considered for general sources. In this problem the optimum mean codeword length of variable-length codes has already been determined. On the other hand, in this paper, we focus on the overflow (or excess codeword length) probability instead of the mean codeword length. The infimum of overflow threshold… ▽ More

    Submitted 17 October, 2018; originally announced October 2018.

  12. arXiv:1801.04439  [pdf, other

    cs.IT

    Variable-Length Resolvability for Mixed Sources and its Application to Variable-Length Source Coding

    Authors: Hideki Yagi, Te Sun Han

    Abstract: In the problem of variable-length $δ$-channel resolvability, the channel output is approximated by encoding a variable-length uniform random number under the constraint that the variational distance between the target and approximated distributions should be within a given constant $δ$ asymptotically. In this paper, we assume that the given channel input is a mixed source whose components may be g… ▽ More

    Submitted 13 January, 2018; originally announced January 2018.

    Comments: 9 pages, submitted to 2018 IEEE International Symposium on Information Theory (ISIT2018)

  13. arXiv:1701.08712  [pdf, ps, other

    cs.IT

    Variable-Length Resolvability for General Sources and Channels

    Authors: Hideki Yagi, Te Sun Han

    Abstract: We introduce the problem of variable-length source resolvability, where a given target probability distribution is approximated by encoding a variable-length uniform random number, and the asymptotically minimum average length rate of the uniform random numbers, called the (variable-length) resolvability, is investigated. We first analyze the variable-length resolvability with the variational dist… ▽ More

    Submitted 30 January, 2017; originally announced January 2017.

    Comments: Submitted to IEEE Trans. on Inf. Theory, Jan. 2017

  14. arXiv:1701.08362  [pdf, ps, other

    cs.IT

    Channel Resolvability Theorems for General Sources and Channels

    Authors: Hideki Yagi

    Abstract: In the problem of channel resolvability, where a given output probability distribution via a channel is approximated by transforming the uniform random numbers, characterizing the asymptotically minimum rate of the size of the random numbers, called the channel resolvability, has been open. This paper derives formulas for the channel resolvability for a given general source and channel pair. We al… ▽ More

    Submitted 29 January, 2017; originally announced January 2017.

    Comments: Extended version for the paper submitted to 2017 IEEE International Symposium on Information Theory (ISIT2017)

  15. arXiv:1701.01800  [pdf, ps, other

    cs.IT

    Variable-Length Lossy Compression Allowing Positive Overflow and Excess Distortion Probabilities

    Authors: Shota Saito, Hideki Yagi, Toshiyasu Matsushima

    Abstract: This paper investigates the problem of variable-length lossy source coding allowing a positive excess distortion probability and an overflow probability of codeword lengths. Novel one-shot achievability and converse bounds of the optimal rate are established by a new quantity based on the smooth max entropy (the smooth Rényi entropy of order zero). To derive the achievability bounds, we give an ex… ▽ More

    Submitted 14 December, 2018; v1 submitted 7 January, 2017; originally announced January 2017.

  16. Variable-Length Coding with Cost Allowing Non-Vanishing Error Probability

    Authors: Hideki Yagi, Ryo Nomura

    Abstract: We derive a general formula of the minimum achievable rate for fixed-to-variable length coding with a regular cost function by allowing the error probability up to a constant $\varepsilon$. For a fixed-to-variable length code, we call the set of source sequences that can be decoded without error the dominant set of source sequences. For any two regular cost functions, it is revealed that the domin… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: 7 pages; extended version of a paper accepted by ISITA2016

  17. arXiv:1501.05887  [pdf, ps, other

    cs.IT

    First- and Second-Order Coding Theorems for Mixed Memoryless Channels with General Mixture

    Authors: Hideki Yagi, Te Sun Han, Ryo Nomura

    Abstract: This paper investigates the first- and second-order maximum achievable rates of codes with/without cost constraints for mixed {channels} whose channel law is characterized by a general mixture of (at most) uncountably many stationary and memoryless discrete channels. These channels are referred to as {mixed memoryless channels with general mixture} and include the class of mixed memoryless channel… ▽ More

    Submitted 5 May, 2016; v1 submitted 23 January, 2015; originally announced January 2015.

    Comments: 29 pages; submitted to IEEE Trans. on Information Theory, Jan. 2015. A conference version of this paper is presented at ISIT2015

  18. arXiv:1407.0124  [pdf, ps, other

    cs.IT

    Single-Letter Characterization of Epsilon-Capacity for Mixed Memoryless Channels

    Authors: Hideki Yagi, Ryo Nomura

    Abstract: For the class of mixed channels decomposed into stationary memoryless channels, single-letter characterizations of the $\varepsilon$-capacity have not been known except for restricted classes of channels such as the regular decomposable channel introduced by Winkelbauer. This paper gives single-letter characterizations of $\varepsilon$-capacity for mixed channels decomposed into at most countably… ▽ More

    Submitted 1 July, 2014; originally announced July 2014.

    Comments: This is an extended version of the paper submitted to the 2014 IEEE International Symposium on Information Theory (ISIT2014)

  19. arXiv:1107.5637  [pdf, other

    cs.IT

    Quantization of Binary-Input Discrete Memoryless Channels

    Authors: Brian M. Kurkoski, Hideki Yagi

    Abstract: The quantization of the output of a binary-input discrete memoryless channel to a smaller number of levels is considered. An algorithm which finds an optimal quantizer, in the sense of maximizing mutual information between the channel input and the quantizer output is given. This result holds for arbitrary channels, in contrast to previous results for restricted channels or a restricted number of… ▽ More

    Submitted 15 May, 2014; v1 submitted 28 July, 2011; originally announced July 2011.

    Comments: 9 pages, 5 figures. Source code available at http://brian.kurkoski.org/

  20. arXiv:1102.3500  [pdf, ps, other

    cs.IT

    Improved Rate-Equivocation Regions for Secure Cooperative Communication

    Authors: Ninoslav Marina, Hideki Yagi, H. Vincent Poor

    Abstract: A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper. One or both senders transmit confidential messages to the receiver, while the eavesdropper tries to decode the transmitted message. The main result is the derivation of a newly achievable rate-equivocation region that is shown… ▽ More

    Submitted 17 February, 2011; originally announced February 2011.

    Comments: 18 pages, 5 figures