Abstract:Unlike the classical linear model, nonlinear generative models have been addressed sparsely in the literature. This work aims to bring attention to these models and their secrecy potential. To this end, we invoke the replica method to derive the asymptotic normalized cross entropy in an inverse probability problem whose generative model is described by a Gaussian random field with a generic covariance function. Our derivations further demonstrate the asymptotic statistical decoupling of Bayesian inference algo… Show more
“…In particular, Fyodorov shows that encryption via a purely quadratic Gaussian random field shows an asymptotic phase transition at a threshold signal-to-noise ratio (SNR), below which recovery via the method of leastsquares becomes uncorrelated. Our initial investigations in [16,Section V] shows that combining Fyodorov's encryption with a simple sphere coding technique can achieve a perfect secrecy This work has been accepted for presentation in 2022 IEEE International Symposium on Information Theory (ISIT) in Espoo, Finland. The link to the final version in the Proceedings of ISIT will be available later.…”
Section: A Contributions and Related Workmentioning
confidence: 99%
“…The derivation of Result 1 relies on the asymptotic characterization of a class Bayesian algorithms used for unsupervised learning in nonlinear generative models. The detailed derivations are given in the extended manuscript [16]. In the sequel, we state a particular form of the generic result in [16] which describes the asymptotic properties of the decoder when it is employed to decode a message encoded via a Gaussian random field.…”
Section: Asymptotics Of the Coding Schemementioning
confidence: 99%
“…The detailed derivations are given in the extended manuscript [16]. In the sequel, we state a particular form of the generic result in [16] which describes the asymptotic properties of the decoder when it is employed to decode a message encoded via a Gaussian random field. This result is then utilized to sketch a proof for Result 1.…”
Section: Asymptotics Of the Coding Schemementioning
confidence: 99%
“…The statistics of the sufficient statistic r are asymptotically described via the results 4 of [16]. We illustrate the asymptotic characterization through the following setting: Consider a vector of uniform bipolar symbols s 0 ∈ {±1} K which is mapped via a Gaussian random field V (•) into x 0 ∈ R N .…”
Section: A Asymptotic Characterization Of the Bayesian Decodermentioning
confidence: 99%
“…where the posterior distribution p (s 0 |y 0 , V) is determined for the true prior belief on s 0 and the true noise variance σ 2 0 . From the asymptotic results of [16], we can derive the following metrics of this setting in the asymptotic regime, i.e., N, K ↑ ∞ with bounded R = K/N :…”
Section: A Asymptotic Characterization Of the Bayesian Decodermentioning
Inverse probability problems whose generative models are given by strictly nonlinear Gaussian random fields show the all-or-nothing behavior: There exists a critical rate at which Bayesian inference exhibits a phase transition. Below this rate, the optimal Bayesian estimator recovers the data perfectly, and above it the recovered data becomes uncorrelated. This study uses the replica method from the theory of spin glasses to show that this critical rate is the channel capacity. This interesting finding has a particular application to the problem of secure transmission: A strictly nonlinear Gaussian random field along with random binning can be used to securely encode a confidential message in a wiretap channel. Our large-system characterization demonstrates that this secure coding scheme asymptotically achieves the secrecy capacity of the Gaussian wiretap channel.
“…In particular, Fyodorov shows that encryption via a purely quadratic Gaussian random field shows an asymptotic phase transition at a threshold signal-to-noise ratio (SNR), below which recovery via the method of leastsquares becomes uncorrelated. Our initial investigations in [16,Section V] shows that combining Fyodorov's encryption with a simple sphere coding technique can achieve a perfect secrecy This work has been accepted for presentation in 2022 IEEE International Symposium on Information Theory (ISIT) in Espoo, Finland. The link to the final version in the Proceedings of ISIT will be available later.…”
Section: A Contributions and Related Workmentioning
confidence: 99%
“…The derivation of Result 1 relies on the asymptotic characterization of a class Bayesian algorithms used for unsupervised learning in nonlinear generative models. The detailed derivations are given in the extended manuscript [16]. In the sequel, we state a particular form of the generic result in [16] which describes the asymptotic properties of the decoder when it is employed to decode a message encoded via a Gaussian random field.…”
Section: Asymptotics Of the Coding Schemementioning
confidence: 99%
“…The detailed derivations are given in the extended manuscript [16]. In the sequel, we state a particular form of the generic result in [16] which describes the asymptotic properties of the decoder when it is employed to decode a message encoded via a Gaussian random field. This result is then utilized to sketch a proof for Result 1.…”
Section: Asymptotics Of the Coding Schemementioning
confidence: 99%
“…The statistics of the sufficient statistic r are asymptotically described via the results 4 of [16]. We illustrate the asymptotic characterization through the following setting: Consider a vector of uniform bipolar symbols s 0 ∈ {±1} K which is mapped via a Gaussian random field V (•) into x 0 ∈ R N .…”
Section: A Asymptotic Characterization Of the Bayesian Decodermentioning
confidence: 99%
“…where the posterior distribution p (s 0 |y 0 , V) is determined for the true prior belief on s 0 and the true noise variance σ 2 0 . From the asymptotic results of [16], we can derive the following metrics of this setting in the asymptotic regime, i.e., N, K ↑ ∞ with bounded R = K/N :…”
Section: A Asymptotic Characterization Of the Bayesian Decodermentioning
Inverse probability problems whose generative models are given by strictly nonlinear Gaussian random fields show the all-or-nothing behavior: There exists a critical rate at which Bayesian inference exhibits a phase transition. Below this rate, the optimal Bayesian estimator recovers the data perfectly, and above it the recovered data becomes uncorrelated. This study uses the replica method from the theory of spin glasses to show that this critical rate is the channel capacity. This interesting finding has a particular application to the problem of secure transmission: A strictly nonlinear Gaussian random field along with random binning can be used to securely encode a confidential message in a wiretap channel. Our large-system characterization demonstrates that this secure coding scheme asymptotically achieves the secrecy capacity of the Gaussian wiretap channel.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.