Corrections to “Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures”

Masahito Hayashi, Vincent Y. F. Tan

IEEE Transactions on Information Theory(2024)

引用 0|浏览0
暂无评分
摘要
There exists a gap for the proofs of the converse parts of Eqs. (49) and (50) in Theorem 1 and Eq. (74) of Theorem 3. These converse parts use Lemma 4, whose proofs contain a gap. We fix these errors when the rate is larger than the critical rate. A special case of Eq. (50) does not coincide the recent result (K. Li, and Y. Yao, arXiv:2209.00554v1) when the rate is smaller than the critical rate.
更多
查看译文
关键词
Information-theoretic security,Equivocation,Conditional Rényi entropies,Rényi divergence,Sibson’s mutual information,Arimoto’s mutual information,Error exponents,Secrecy Exponents,Second-order coding rates
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要