The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Non-malleable commitments, introduced by Dolev, Dwork and Naor (STOC 1991), are a fundamental cryptographic primitive, and their round complexity has been a subject of great interest. And yet, the goal of achieving non-malleable commitments with only one or two rounds} has been elusive. Pass (TCC 2013) captured this difficulty by proving important impossibility results regarding two-round non-malleable...
Information-centric networking (ICN), a strong candidate for future internet architecture, consists of two kinds of packets, interest and data packets, both of which carry the name of data content to be requested (or delivered). The data packet is associated with a public key signature so that the data receiver can verify the data packet's correctness, integrity and provenance. Certificate-based signature...
In recent years, numbers of non-orthogonal multiple access (NOMA) schemes have been proposed to support the great amounts of wireless connections. However, complex multi-user detection is needed in case that the user power differentiation is not available and simple successive interference cancellation cannot directly apply, which usually incurs unaffordable computational complexity. In this paper,...
Polar codes were recently chosen to protect the control channel information in the next-generation mobile communication standard (5G) defined by the 3GPP. As a result, receivers will have to implement blind detection of polar coded frames in order to keep complexity, latency, and power consumption tractable. As a newly proposed class of block codes, the problem of polar-code blind detection has received...
NarrowBand Waveforms (NBWF) are often used in VHF or UHF tactical communications. For these kinds of waveforms, low latency and robust data rates result in short codeword lengths that are challenging in terms of channel coding. Usually, serially concatenated convolutional code and continuous phase modulation (CC-CPM) schemes are considered in the context of NBWF. When evaluating the achievable rates,...
We propose a novel technique that we call reduced complexity interleaved multi-carrier CDMA (RC I-MC-CDMA) as an alternative to MC-CDMA for indoor VLC systems. It uses shorter CDMA codes and interleaved sub-bands to lower the overall complexity without a significant additional power penalty.
In existing uplink non-orthogonal multiple access (NOMA) schemes, complicated user pairing schemes are required to ensure differentiated arriving power at the access point, which may incur considerable scheduling overhead. To address this issue, we propose a novel rate-splitting NOMA scheme in this paper. In particular, each user information is “split” into multiple flows, which equivalently form...
Generalized frequency division multiplexing (GFDM) with the flexible structure is one of the promising candidates for the fifth generation wireless communication system. This paper focuses on training sequence design that is used in the estimation of in-phase(I) and quadrature(Q) imbalance parameters on GFDM receivers as well as frequency selective channel. Combining with the structure of low complexity...
Next generation cellular networks (5G) have to deal with deployment of massive machine-type-communication (MTC) devices as the internet of things (IoT) becomes pervasive. To cater to such demand, 3GPP has finalized specifications for enhanced machine type communication (eMTC) and narrowband IoT (NB-IoT) as part of LTE Release 131. To avoid resource congestion to legacy users, eMTC communication can...
In this work we present construction of Space Time Block Codes (STBC) from Abelian codes. A well known Eisenstein-Jacobi rank preserving map is applied to map the codeword matrix symbols to symbols in the complex plane. We then propose an NT × NR MIMO (multiple input, multiple output) communication system employing the constructed STBC. An analysis on the receiver (decoder) computational complexity...
Multiuser Detection (MUD) and Channel Estimation techniques in Space-Division Multiple Access aided Orthogonal Frequency Division Multiplexing (SDMA-OFDM) systems recently received intensive interest in receiver design technologies. The maximum likelihood (ML) MUD that provides optimal performance has the cost of a dramatically increased computational complexity. The minimum mean-squared error (MMSE)...
Although the base station processing and the majority of the protocols of the wireless systems are standardized by 3GPP, the receiver architecture and implementation remain vendor-dependent. The receiver design should fulfill computational efficiency requirements, and be evaluated in practical simulators or emulators that are compliant with real-world wireless standards. In this paper, we provide...
One of the main issues, in the specification of the 5G radio access network (RAN) technology, is the design of a new waveform, overcoming the limitations of the CP-OFDM in terms of frequency localization, spectral efficiency and robustness to users asynchronism, while keeping low latency and reduced transceiver implementation complexity. In the last decade, many waveforms have been proposed in order...
Among the filter bank multicarrier techniques for efficient transmission in communication systems, the recently proposed FBMC-PAM transceiver exhibits many advantages in comparison with the OFDM system; in particular, it does not require a cyclic prefix and, in the asynchronous multi-user context, it provides a high level of spectral separation among users. However, a performance loss is encountered...
In this paper, we introduce a Downsample Upsample Shift Add (DUSA) method that faithfully implements the Time Compression Overlap-Add (TC-OLA) technique while overcoming some of the existing TC-OLA implementation shortcomings. The mathematical framework of DUSA relies on three operators: downsample, upsample, shift and add operators, and is shown to yield the same results as TC-OLA. Moreover, at some...
We experimentally demonstrate transmission of 20×50-Gb/s WDM PAM-4 channels over an 80-km uncompensated fiber link, based on reduced complexity DSP and hardware. BER values below pre-FEC limit of 3.8×10·3 are reported, validating the proposed architecture for low-cost, high-capacity short-reach connectivity.
Low power wide area network (LPWAN) receivers must first decide about the presence of a transmission in order to retrieve the information that was being sent by wireless sensor nodes. This is exacerbated by the use of modern coding techniques that are able operate at very low signal to noise ratio (SNR), and inaccuracies originating from the transmitter hardware. Several, mostly low complexity methods...
In contrast to the more prominent discrete-variable quantum key distribution (DV-QKD), which requires specialized hardware like single-photon detectors, the continuous-variable version (CV-QKD) promises low-cost and high-performance implementations by leveraging mature telecommunication technology. In this paper we demonstrate a simplified CV-QKD architecture based on analog frontends and digitizers...
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
Soft-input soft-output (SISO) sphere decoding is applied to multiple-input multi-output (MIMO) systems to offer good bit error rate (BER) performance but at high complexity. To reduce this computational complexity, we propose a novel hybrid enumeration strategy for such decoding that dynamically determines the candidate list; moreover, this strategy uses a new node enumeration based on concentric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.