Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures

@article{Hayashi2017EquivocationsEA,
  title={Equivocations, Exponents, and Second-Order Coding Rates Under Various R{\'e}nyi Information Measures},
  author={Masahito Hayashi and Vincent Y. F. Tan},
  journal={IEEE Transactions on Information Theory},
  year={2017},
  volume={63},
  pages={975-1005}
}
We evaluate the asymptotics of equivocations, their exponents as well as their second-order coding rates under various Rényi information measures. Specifically, we consider the effect of applying a hash function on a source and we quantify the level of non-uniformity and dependence of the compressed source from another correlated source when the number of copies of the sources is large. Unlike previous works that use Shannon information measures to quantify randomness, information, or… CONTINUE READING
Related Discussions
This paper has been referenced on Twitter 3 times. VIEW TWEETS

Citations

Publications citing this paper.
Showing 1-9 of 9 extracted citations

Remaining uncertainties and exponents under Rényi information measures

2016 IEEE International Symposium on Information Theory (ISIT) • 2016
View 3 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 65 references

Effective secrecy: Reliability, confusion and stealth

2014 IEEE International Symposium on Information Theory • 2014
View 4 Excerpts
Highly Influenced

Information Theory: Coding Theorems for Discrete Memoryless Systems

I. Csiszár, J. Körner
2011
View 6 Excerpts
Highly Influenced

The wire-tap channel

The Bell System Technical Journal • 1975
View 7 Excerpts
Highly Influenced

Joint channel intrinsic randomness and channel resolvability

2013 IEEE Information Theory Workshop (ITW) • 2013
View 5 Excerpts
Highly Influenced

Information Theoretic Security

Lecture Notes in Computer Science • 2011
View 4 Excerpts
Highly Influenced

Physical-Layer Security: From Information Theory to Security Engineering

M. Bloch, J. Barros
2011
View 4 Excerpts
Highly Influenced

Security of quantum key distribution

Ausgezeichnete Informatikdissertationen • 2005
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…