Christian Deppe

Christian Deppe
  • Dr. math
  • Technical University of Munich

About

270
Publications
9,470
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,765
Citations
Introduction
Christian Deppe currently works at TUM (Technical University of Munich). Christian does research in Applied Mathematics. Their current project is 'Identification'.
Current institution
Technical University of Munich

Publications

Publications (270)
Chapter
Common randomness (CR), as a resource, is not commonly exploited in existing practical communication systems. In the CR generation framework, both the sender and receiver aim to generate a common random variable observable to both, ideally with low error probability. The availability of this CR allows us to implement correlated random protocols tha...
Chapter
In this paper, we propose a novel quantum computing approach to solve the real-world problem of optimizing transportation in bustling Kathmandu city. The transportation system in Kathmandu is chaotic, with no central authority controlling the transportation. We leverage this chaotic feature in our quantum optimization procedure. Characterized by qu...
Chapter
The model of identification via channels, introduced by Ahlswede and Dueck, has attracted increasing attention in recent years. Unlike in Shannon’s classical model, where the receiver aims to determine which message was sent from a set of M messages, message identification focuses solely on discerning whether a specific message m was transmitted. T...
Chapter
New applications in modern communications are demanding robust and ultra-reliable low-latency information exchange such as machine-to-machine and human-to-machine communications. For many of these applications, the identification approach of Ahlswede and Dueck is much more efficient than the classical message transmission scheme proposed by Shannon...
Chapter
Sadly, our esteemed colleague and friend Ning Cai passed away on 25th May, 2023. In his memory, Ingo Althöfer, Holger Boche, Christian Deppe, Jens Stoye, Ulrich Tamm, Andreas Winter, and Raymond Yeung organized the “Workshop on Information Theory and Related Fields” at the Bielefeld ZiF (Center for Interdisciplinary Research). This special event wa...
Chapter
Fekete’s lemma is a well known result from combinatorial mathematics that shows the existence of a limit value related to super- and subadditive sequences of real numbers. In this paper, we analyze Fekete’s lemma in view of the arithmetical hierarchy of real numbers by Xizhong Zheng and Klaus Weihrauch and fit the results into an information-theore...
Chapter
It is with heavy hearts that we mourn the passing of Ning Cai, a luminary whose pioneering spirit illuminated the realms of network coding and beyond. On May 25, 2023, at the age of 75, Prof. Cai bid farewell, leaving behind a profound legacy that continues to resonate across generations of researchers. His contributions spanned a vast spectrum, fr...
Chapter
Motivated by deterministic identification via classical channels, where the encoder is not allowed to use randomization, we revisit the problem of identification via quantum channels but now with the additional restriction that the message encoding must use pure quantum states, rather than general mixed states. Together with the previously consider...
Chapter
The one-day workshop, held prior to the “ZIF Workshop on Information Theory and Related Fields”, provided an excellent opportunity for in-depth discussions on several topics within the field of post-Shannon theory. The agenda covered deterministic and randomized identification, focusing on various methods and algorithms for identifying data or sign...
Chapter
This paper presents a comprehensive guide to designing minimal trellises for both non-degenerate and degenerate decoding of quantum stabilizer codes. For non-degenerate decoding, various strategies are explored, leveraging insights from classical rectangular codes to minimize the complexity associated with the non-degenerate maximum likelihood erro...
Preprint
Molecular communication (MC) is an emerging paradigm that enables data transmission through biochemical signals rather than traditional electromagnetic waves. This approach is particularly promising for environments where conventional wireless communication is impractical, such as within the human body. However, security and privacy pose significan...
Preprint
The problem of identification over a discrete memoryless wiretap channel is examined under the criterion of semantic effective secrecy. This secrecy criterion guarantees both the requirement of semantic secrecy and of stealthy communication. Additionally, we introduce the related problem of combining approximation-of-output statistics and transmiss...
Preprint
Full-text available
In communication theory, attacks like eavesdropping or jamming are typically assumed to occur at the channel level, while communication parties are expected to follow established protocols. But what happens if one of the parties turns malicious? In this work, we investigate a compelling scenario: a multiple-access channel with two transmitters and...
Preprint
Full-text available
We investigate deterministic identification over arbitrary memoryless channels under the constraint that the error probabilities of first and second kind are exponentially small in the block length $n$, controlled by reliability exponents $E_1,E_2 \geq 0$. In contrast to the regime of slowly vanishing errors, where the identifiable message length s...
Preprint
Full-text available
This work investigates the problem of Oblivious Transfer (OT) over a noisy Multiple Access Channel (MAC) involving two non-colluding senders and a single receiver. The channel model is characterized by correlations among the parties, with the parties assumed to be either honest-but-curious or, in the receiver's case, potentially malicious. We propo...
Preprint
Deterministic identification offers an efficient solution for scenarios where decoding entire messages is unnecessary. It is commonly used in alarm systems and control systems. A key advantage of this approach is that the capacity for deterministic identification in Gaussian channels with power constraints grows superexponentially, unlike Shannon's...
Article
Full-text available
Following initial work by JaJa, Ahlswede and Cai, and inspired by a recent renewed surge in interest in deterministic identification (DI) via noisy channels, we consider the problem in its generality for memoryless channels with finite output, but arbitrary input alphabets. Such a channel is essentially given by its output distributions as a subset...
Article
We consider a standard two-source model for uniform common randomness (UCR) generation, in which two terminals (Terminal A and Terminal B) observe independent and identically distributed (i.i.d.) samples of a correlated finite source, and where Terminal A is allowed to send information to Terminal B over an arbitrary single-user channel. We provide...
Article
Full-text available
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver’s goal is simply to verify whether a specific message of interest was sent. Unlike Shannon’s transmission codes, which aim for message decoding, ID codes for a discrete memoryless channel (DMC) are far more efficient; their size grows doubly exponentially with the blockl...
Article
Full-text available
Physical unclonable functions (PUFs) leverage inherent, nonclonable physical randomness to generate unique input-output pairs, serving as secure fingerprints for cryptographic protocols like authentication. Quantum PUFs (QPUFs) extend this concept by using quantum states as input-output pairs, offering advantages over classical PUFs, such as challe...
Preprint
Full-text available
This paper explores communication over a two-sender, two-receiver classical interference channel, enhanced by the availability of entanglement resources between transmitters. The central contribution are an inner and outer bound on the capacity region for a general interference channel with entangled transmitters. It addresses the persistent challe...
Preprint
Full-text available
This paper presents a comprehensive guide to designing minimal trellises for both non-degenerate and degenerate decoding of quantum stabilizer codes. For non-degenerate decoding, various strategies are explored, leveraging insights from classical rectangular codes to minimize the complexity associated with the non-degenerate maximum likelihood erro...
Preprint
It is with heavy hearts that we mourn the passing of Ning Cai, a luminary whose pioneering spirit illuminated the realms of network coding and beyond. On May 25, 2023, at the age of 75, Prof. Cai bid farewell, leaving behind a profound legacy that continues to resonate across generations of researchers. His contributions spanned a vast spectrum, fr...
Preprint
In contrast to Shannon transmission codes, the size of identification (ID) codes for discrete memoryless channels (DMCs) experiences doubly exponential growth with the block length when randomized encoding is used. Additional enhancements within the ID paradigm can be realized through supplementary resources such as quantum entanglement, common ran...
Preprint
We investigate message identification over a K-sender Gaussian multiple access channel (K-GMAC). Unlike conventional Shannon transmission codes, the size of randomized identification (ID) codes experiences a doubly exponential growth in the code length. Improvements in the ID approach can be attained through additional resources such as quantum ent...
Preprint
The one-day workshop, held prior to the "ZIF Workshop on Information Theory and Related Fields", provided an excellent opportunity for in-depth discussions on several topics within the field of post-Shannon theory. The agenda covered deterministic and randomized identification, focusing on various methods and algorithms for identifying data or sign...
Preprint
Sadly, our esteemed colleague and friend Ning Cai passed away on 25th May, 2023. In his memory, Ingo Alth\"ofer, Holger Boche, Christian Deppe, Jens Stoye, Ulrich Tamm, Andreas Winter, and Raymond Yeung have organized the "Workshop on Information Theory and Related Fields" at the Bielefeld ZiF (Center for Interdisciplinary Research). This special e...
Article
Full-text available
In this work, we present two new methods for variational quantum circuit (VQC) process tomography (PT) onto n qubits systems: unitary PT based on VQCs (PT_VQC) and unitary evolution-based variational quantum singular value decomposition (U-VQSVD). Compared to the state of the art, PT_VQC halves in each run the required amount of qubits for unitary...
Preprint
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from...
Preprint
Full-text available
This work delivers a novel user-server authentication procedure exploiting the features of maximally entangled pairs in both an idealistic noiseless scenario and a moderately noisy one. Additionally, we leverage the specific features of our design, which are conveniently suited for inlaying it into the well known BB84 quantum communication protocol...
Article
Full-text available
Mycobacterium bovis bacille Calmette-Guérin (BCG) is the most effective intravesical immunotherapy for non-muscle invasive bladder cancer (NMIBC), administered after its transurethral resection. Although its instillation is generally well tolerated, BCG-related infectious complications may occur in up to 5% of patients. Clinical manifestations may...
Article
The concept of complexity has become pivotal in multiple disciplines, including quantum information, where it serves as an alternative metric for gauging the chaotic evolution of a quantum state. This paper focuses on Krylov complexity , a specialized form of quantum complexity that offers an unambiguous and intrinsically meaningful assessment of t...
Article
Full-text available
In 1946, Koopman introduced a two-sided search model. In this model, a searched object is active and can move, at most, one step after each test. We analyze the model of a combinatorial two-sided search by allowing more moves of the searched object after each test. We give strategies and show that they are optimal. We consider adaptive and non-adap...
Article
Full-text available
Numerous applications of the Internet of Things (IoT) feature an event recognition behavior where the established Shannon capacity is not authorized to be the central performance measure. Instead, the identification capacity for such systems is considered to be an alternative metric, and has been developed in the literature. In this paper, we devel...
Article
Full-text available
Various applications of molecular communications (MCs) feature an alarm-prompt behavior for which the prevalent Shannon capacity may not be the appropriate performance metric. The identification capacity as an alternative measure for such systems has been motivated and established in the literature. In this paper, we study deterministic K-identific...
Article
Full-text available
The present article analyzes aspects of the problem of remote state estimation via noisy communication channels (RSE) for their Blum-Shub-Smale (BSS) computability, motivated by an exemplary application to a formal model of virtual twinning subject to stringent integrity requirements. Computability theory provides a unique framework for the for...
Article
Full-text available
Communication over a classical multiple-access channel (MAC) with entanglement resources is considered, whereby two transmitters share entanglement resources a priori before communication begins. Leditzky et al. (2020) presented an example of a classical MAC, defined in terms of a pseudo telepathy game, such that the sum rate with entangled transmi...
Article
Various applications of molecular communications (MC) are event-triggered, and, as a consequence, the prevalent Shannon capacity may not be the right measure for performance assessment. Thus, in this paper, we motivate and establish the identification capacity as an alternative metric. In particular, we study deterministic identification (DI) for t...
Article
The increase in the amount of data sent through the Internet is expected to scale up and accelerate in the coming years, along with the increasing number of connected devices. Current data rates via optical fiber communication channels are approaching the channel capacity and eventually, wireless communication will follow a similar trend. This mean...
Article
Over the past decades, the problem of communication over finite-state Markov channels (FSMCs) has been investigated in many works and the capacity of FSMCs has been studied in closed form under the assumption of the availability of partial/complete channel state information at the sender and/or the receiver. In our work, we focus on infinite-state...
Article
Full-text available
Identification over quantum broadcast channels is considered. As opposed to the information transmission task, the decoder only identifies whether a message of his choosing was sent or not. This relaxation allows for a double-exponential code size. An achievable identification region is derived for a quantum broadcast channel, and a full characteri...
Article
Full-text available
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical-fibre communication systems. Quantum k-means clustering promises a speed-up over the classical k-means algorithm; however, it has been shown to not currently provide this speed-up for decodi...
Preprint
Full-text available
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical-fibre communication systems. Quantum k-means clustering promises a speed-up over the classical k-means algorithm; however, it has been shown to currently not provide this speed-up for decodi...
Preprint
Full-text available
In the context of optical signal processing, quantum and quantum-inspired machine learning algorithms have massive potential for deployment. One of the applications is in error correction protocols for the received noisy signals. In some scenarios, non-linear and unknown errors can lead to noise that bypasses linear error correction protocols that...
Preprint
Full-text available
Nearest-neighbour clustering is a powerful set of heuristic algorithms that find natural application in the decoding of signals transmitted using the $M$-Quadrature Amplitude Modulation (M-QAM) protocol. Lloyd et al. proposed a quantum version of the algorithm that promised an exponential speed-up. We analyse the performance of this algorithm by si...
Preprint
Full-text available
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical fibre communication systems. Quantum nearest-neighbour clustering promises a speed-up over the classical algorithms, but the current embedding of classical data introduces inaccuracies, insu...
Article
Entanglement resources can increase transmission rates substantially. Unfortunately, entanglement is a fragile resource that is quickly degraded by decoherence effects. In order to generate entanglement for optical communication, the transmitter and the receiver first prepare entangled spin-photon pairs locally, and then the photon at the transmitt...
Article
The identification capacity region of the compound broadcast channel is determined under an average error criterion, where the sender has no channel state information. We give single-letter identification capacity formulas for discrete channels and multiple-input multiple-output Gaussian channels under an average input constraint. The capacity theo...
Preprint
An upper bound to the identification capacity of discrete memoryless wiretap channels is derived under the requirement of semantic effective secrecy, combining semantic secrecy and stealth constraints. A previously established lower bound is improved by applying it to a prefix channel, formed by concatenating an auxiliary channel and the actual cha...
Preprint
Deterministic identification over K-input multiple-access channels with average input cost constraints is considered. The capacity region for deterministic identification is determined for an average-error criterion, where arbitrarily large codes are achievable. For a maximal-error criterion, upper and lower bounds on the capacity region are derive...
Preprint
In the identification (ID) scheme proposed by Ahlswede and Dueck, the receiver only checks whether a message of special interest to him has been sent or not. In contrast to Shannon transmission codes, the size of ID codes for a Discrete Memoryless Channel (DMC) grows doubly exponentially fast with the blocklength, if randomized encoding is used. Th...
Preprint
We consider a standard two-source model for uniform common randomness (UCR) generation, in which Alice and Bob observe independent and identically distributed (i.i.d.) samples of a correlated finite source and where Alice is allowed to send information to Bob over an arbitrary single-user channel. We study the \(\boldsymbol{\epsilon}\)-UCR capacity...
Preprint
Full-text available
Deterministic K-Identification (DKI) for the binary symmetric channel (BSC) is developed. A full characterization of the DKI capacity for such a channel, with and without the Hamming weight constraint, is established. As a key finding, we find that for deterministic encoding the number of identifiable messages $K$ may grow exponentially with the co...
Preprint
Full-text available
Nearest-neighbour clustering is a simple yet powerful machine learning algorithm that finds natural application in the decoding of signals in classical optical fibre communication systems. Quantum nearest-neighbour clustering promises a speed-up over the classical algorithms, but the current embedding of classical data introduces inaccuracies, insu...
Preprint
Full-text available
The Binomial channel serves as a fundamental model for molecular communication (MC) systems employing molecule-counting receivers. Here, deterministic identification (DI) is addressed for the discrete-time Binomial channels (DTBC), subject to an average and a peak constraint on the molecule release rate. We establish that the number of different me...
Chapter
With the limitations of classical satellite communications the scientific community is looking into newer technologies to sustain and meet with the security standards and reduce the computational complexity in modern day satellite communication as we are heading to the next generation of communication. Therefore quantum mechanics has drawn attentio...
Preprint
Communication over a classical multiple-access channel (MAC) with entanglement resources is considered, whereby two transmitters share entanglement resources a priori before communication begins. Leditzki et al. (2020) presented an example of a classical MAC, defined in terms of a pseudo telepathy game, such that the sum rate with entangled transmi...
Preprint
Full-text available
p>The paper compares quantum and classical error correctin with the aim for a pathway to 5G beyong networks where there will be a notion of quantum computation in the current classical communication architecture. </p
Preprint
Full-text available
p>The paper compares quantum and classical error correctin with the aim for a pathway to 5G beyong networks where there will be a notion of quantum computation in the current classical communication architecture. </p
Article
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit...
Preprint
Full-text available
We address the problem of correcting a single error in an arbitrary discrete memoryless channel with error-free instantaneous feedback. For the case of a one-time feedback, we propose a method for constructing optimal transmission strategies. The obtained result allows us to prove that for a binary channel, two feedbacks are sufficient to transmit...
Article
We investigate the problem of message transmission and the problem of common randomness (CR) generation over single-user multiple-input multiple-output (MIMO) slow fading channels with average input power constraint, additive white Gaussian noise (AWGN), arbitrary state distribution and with complete channel state information available at the recei...
Preprint
Full-text available
Deterministic $K$-identification (DKI) is addressed for Gaussian channels with slow fading (GSF), where the transmitter is restricted to an average power constraint and channel side information is available at the decoder. We derive lower and upper bounds on the DKI capacity when the number identifiable messages $K$ may grow with the codeword lengt...
Preprint
Full-text available
Several applications of molecular communications (MC) feature an alarm-prompt behavior for which the prevalent Shannon capacity may not be the appropriate performance metric. The identification capacity as an alternative measure for such systems has been motivated and established in the literature. In this paper, we study deterministic identificati...
Preprint
We consider the problem of remotely tracking the state of and unstable linear time-invariant plant by means of data transmitted through a noisy communication channel from an algorithmic point of view. Assuming the dynamics of the plant are known, does there exist an algorithm that accepts a description of the channel's characteristics as input, and...

Network

Cited By