{"quality_controlled":"1","oa_version":"Preprint","main_file_link":[{"url":"https://doi.org/10.48550/arXiv.2101.12426","open_access":"1"}],"date_created":"2024-01-08T13:04:54Z","publication_status":"published","publication":"IEEE Transactions on Information Theory","status":"public","article_type":"original","month":"07","citation":{"ieee":"Y. Zhang, “Zero-error communication over adversarial MACs,” IEEE Transactions on Information Theory, vol. 69, no. 7. Institute of Electrical and Electronics Engineers, pp. 4093–4127, 2023.","apa":"Zhang, Y. (2023). Zero-error communication over adversarial MACs. IEEE Transactions on Information Theory. Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/tit.2023.3257239","ista":"Zhang Y. 2023. Zero-error communication over adversarial MACs. IEEE Transactions on Information Theory. 69(7), 4093–4127.","mla":"Zhang, Yihan. “Zero-Error Communication over Adversarial MACs.” IEEE Transactions on Information Theory, vol. 69, no. 7, Institute of Electrical and Electronics Engineers, 2023, pp. 4093–127, doi:10.1109/tit.2023.3257239.","ama":"Zhang Y. Zero-error communication over adversarial MACs. IEEE Transactions on Information Theory. 2023;69(7):4093-4127. doi:10.1109/tit.2023.3257239","chicago":"Zhang, Yihan. “Zero-Error Communication over Adversarial MACs.” IEEE Transactions on Information Theory. Institute of Electrical and Electronics Engineers, 2023. https://doi.org/10.1109/tit.2023.3257239.","short":"Y. Zhang, IEEE Transactions on Information Theory 69 (2023) 4093–4127."},"type":"journal_article","volume":69,"page":"4093-4127","keyword":["Computer Science Applications","Information Systems"],"year":"2023","issue":"7","acknowledgement":"The author would like to thank Amitalok J. Budkuley and Sidharth Jaggi for many helpful discussions at the early stage of this work. He would also like to thank Nir Ailon, Qi Cao, and Chandra Nair for discussions on a related problem regarding zero-error binary adder MACs.\r\nThe work of Yihan Zhang was supported by the European Union’s Horizon 2020 Research and Innovation Programme under Grant 682203-ERC-[Inf-Speed-Tradeoff]","author":[{"id":"2ce5da42-b2ea-11eb-bba5-9f264e9d002c","first_name":"Yihan","last_name":"Zhang","orcid":"0000-0002-6465-6258","full_name":"Zhang, Yihan"}],"doi":"10.1109/tit.2023.3257239","external_id":{"arxiv":["2101.12426"]},"_id":"14751","department":[{"_id":"MaMo"}],"article_processing_charge":"No","oa":1,"day":"01","date_updated":"2024-01-09T08:45:24Z","publication_identifier":{"issn":["0018-9448"],"eissn":["1557-9654"]},"date_published":"2023-07-01T00:00:00Z","publisher":"Institute of Electrical and Electronics Engineers","scopus_import":"1","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"title":"Zero-error communication over adversarial MACs","abstract":[{"lang":"eng","text":"We consider zero-error communication over a two-transmitter deterministic adversarial multiple access channel (MAC) governed by an adversary who has access to the transmissions of both senders (hence called omniscient ) and aims to maliciously corrupt the communication. None of the encoders, jammer and decoder is allowed to randomize using private or public randomness. This enforces a combinatorial nature of the problem. Our model covers a large family of channels studied in the literature, including all deterministic discrete memoryless noisy or noiseless MACs. In this work, given an arbitrary two-transmitter deterministic omniscient adversarial MAC, we characterize when the capacity region: 1) has nonempty interior (in particular, is two-dimensional); 2) consists of two line segments (in particular, has empty interior); 3) consists of one line segment (in particular, is one-dimensional); 4) or only contains (0,0) (in particular, is zero-dimensional). This extends a recent result by Wang et al. (201 9) from the point-to-point setting to the multiple access setting. Indeed, our converse arguments build upon their generalized Plotkin bound and involve delicate case analysis. One of the technical challenges is to take care of both “joint confusability” and “marginal confusability”. In particular, the treatment of marginal confusability does not follow from the point-to-point results by Wang et al. Our achievability results follow from random coding with expurgation."}],"intvolume":" 69"}