Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing 2015
DOI: 10.1145/2746539.2746591
|View full text |Cite
|
Sign up to set email alerts
|

A Characterization of the Capacity of Online (causal) Binary Channels

Abstract: In the binary online (or "causal") channel coding model, a sender wishes to communicate a message to a receiver by transmitting a codeword x = (x 1 , . . . , x n ) ∈ {0, 1} n bit by bit via a channel limited to at most pn corruptions. The channel is "online" in the sense that at the ith step of communication the channel decides whether to corrupt the ith bit or not based on its view so far, i.e., its decision depends only on the transmitted bits (x 1 , . . . , x i ). This is in contrast to the classical advers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 34 publications
(40 citation statements)
references
References 22 publications
0
40
0
Order By: Relevance
“…• Achievability: Motivated by the stochastic encoder designed in [12], we construct an ensemble of concatenated codes (with independent stochasticity in each chunk) in Section 6.…”
Section: Classes Of Adversariesmentioning
confidence: 99%
See 2 more Smart Citations
“…• Achievability: Motivated by the stochastic encoder designed in [12], we construct an ensemble of concatenated codes (with independent stochasticity in each chunk) in Section 6.…”
Section: Classes Of Adversariesmentioning
confidence: 99%
“…Hence, regardless of the list he chooses to impose on Bob via the prefix, with high probability over the specific suffix that Alice transmits, there will be no "reasonably close" suffix for any u = w in this list. Proving such a fact requires one to prove a somewhat subtle "code goodness" property, analogous to the one in [12], which may be viewed as a generalization of a Gilbert-Varsahmov-type about the specific stochastic codeword transmitted in those chunks. (iii) Another relatively straightforward issue pertains to the fact that Alice and James may use non-uniform power allocations.…”
Section: Intuition Behind the Formalismmentioning
confidence: 99%
See 1 more Smart Citation
“…[4]) implies James can ensure any such communication protocol must be either non-covert or unreliable. This is true even if James has computational restrictions, or is required to behave causally [11]. This is in stark contrast to the probabilistic channel setting wherein covert and reliable communication is possible for a wide range of parameters.…”
Section: Introductionmentioning
confidence: 99%
“…regardless of James' jamming strategy.Unfortunately, in our setting this turns out to be impossible -it turns out (as we show in our first main result) that the noise S on Bob's channel is adversarially chosen (rather than randomly as in the classical setting, e.g.[4]) implies James can ensure any such communication protocol must be either non-covert or unreliable. This is true even if James has computational restrictions, or is required to behave causally [11]. This is in stark contrast to the probabilistic channel setting wherein covert and reliable communication is possible for a wide range of parameters.Hence, we mildly relax our problem -prior to transmission, Alice and Bob secretly share a ∆(n)-bit randomly generated shared key that is unknown to James.…”
mentioning
confidence: 99%