Fundamental Limits of Distributed Encoding

In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which comprises of a set of K ∈N isolated source nodes and N ∈N encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of adversarial nodes, denoted by β∈N, and the cardinality of the set of symbols that each one generates, denoted by v ∈N, this would make the process of decoding from the encoded symbols impossible. Assume that a decoder connects to an arbitrary subset of t ∈N encoding nodes and wants to decode the symbols of the honest nodes correctly, without necessarily identifying the sets of honest and adversarial nodes. In this paper, we characterize t^* ∈N, as the minimum of such t, as a function of K, N, β, and v. We show that for β≥ 1, v> 2, t^*=K+β (v-1)+1, if N ≥ K+β (v-1)+1, and t^*=N, if N < K+β (v-1). In order to achieve t^*, we introduce a nonlinear code. In continue, we focus on linear coding and show that t^*_linear=K+2β(v-1), if N> K+2β(v-1), and t^*_linear=N, if N< K+2β(v-1).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/25/2021

Encoding Scheme For Infinite Set of Symbols: The Percolation Process

It is shown here that the percolation process on binary trees that is eq...
research
01/26/2021

Real-time oblivious erasure correction with linear time decoding and constant feedback

We continue the study of rateless codes for transmission of information ...
research
02/11/2022

Reliability function for streaming over a DMC with feedback

Conventionally, posterior matching is investigated in channel coding and...
research
11/27/2019

Property Invariant Embedding for Automated Reasoning

Automated reasoning and theorem proving have recently become major chall...
research
06/04/2023

Encryption by using base-n systems with many characters

It is possible to interpret text as numbers (and vice versa) if one inte...
research
04/13/2022

On Extremal Rates of Secure Storage over Graphs

A secure storage code maps K source symbols, each of L_w bits, to N code...
research
11/08/2017

Learning K-way D-dimensional Discrete Code For Compact Embedding Representations

Embedding methods such as word embedding have become pillars for many ap...

Please sign up or login with your details

Forgot password? Click here to reset