pith. sign in

arxiv: 2501.14941 · v6 · pith:XJBIWLBOnew · submitted 2025-01-24 · 💻 cs.IT · math.IT· math.PR

On the Optimality of Gaussian Code-books for Signaling over a Two-Users Weak Gaussian Interference Channel

Pith reviewed 2026-05-23 05:20 UTC · model grok-4.3

classification 💻 cs.IT math.ITmath.PR
keywords two-user interference channelGaussian codebookscapacity regionweak interferenceHan-Kobayashi regionsingle-letter codingcalculus of variationstime-sharing
0
0 comments X

The pith

Single-letter Gaussian codebooks achieve the capacity region of the two-user weak Gaussian interference channel.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper shows that the entire capacity region can be reached using only single-letter i.i.d. Gaussian codebooks. It begins at a known Gaussian corner point and applies calculus of variations to move along the boundary in small steps, proving that each new endpoint remains Gaussian. It further establishes that allowing vector-valued inputs produces no higher rates than the scalar single-letter case and that optimum time-sharing uses at most two phases. The Gaussian version of the Han-Kobayashi region therefore meets the boundary for weak interference and extends to the general case.

Core claim

The capacity region of a two-user weak Gaussian interference channel is achieved by single-letter Gaussian code-books. Starting from a corner point realized by Gaussian code-books, calculus of variations shows that each incremental step along the boundary ends at a Gaussian point. Any optimum vector-input solution does not exceed the single-letter value, at most two phases suffice for time-sharing, and the Han-Kobayashi region with these code-books coincides with the boundary.

What carries the argument

Incremental boundary traversal via calculus of variations that preserves Gaussian optimality from known corner points, combined with the proof that vector inputs cannot exceed single-letter rates.

If this is right

  • The Han-Kobayashi achievable region evaluated with single-letter Gaussian codebooks coincides with the capacity boundary.
  • Any optimum solution using vector inputs yields rates no higher than the single-letter Gaussian case.
  • Optimum time-sharing between boundary points requires at most two phases.
  • The same Gaussian optimality holds for the general interference case, not only the weak regime.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Gaussian codebooks may suffice for capacity in other two-user interference models once similar boundary arguments are applied.
  • Capacity-achieving schemes for these channels can be realized with standard Gaussian signaling without needing structured or non-Gaussian alphabets.
  • The two-phase time-sharing limit simplifies the search for optimal operating points in practical rate allocation.

Load-bearing premise

That moving along the boundary in small steps with calculus of variations keeps the optimum input distribution Gaussian at every point and that vector inputs cannot improve on the single-letter case.

What would settle it

An explicit non-Gaussian single-letter distribution or a vector input that achieves a strictly higher rate pair than the best Gaussian single-letter codebook on some point of the claimed capacity boundary.

Figures

Figures reproduced from arXiv: 2501.14941 by Amir K. Khandani.

Figure 1
Figure 1. Figure 1: Two users Gaussian Interference Channel (GIC) with [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: An example for power reallocation and its corresponding step along the boundary. [PITH_FULL_IMAGE:figures/full_fig_p003_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: Channel models depicting decoding methods discussed in Theorem 3 where 3(a) corresponds [PITH_FULL_IMAGE:figures/full_fig_p011_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: Example of a channel where the stationary solution for mutual information may result in a [PITH_FULL_IMAGE:figures/full_fig_p011_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: Υ and Γ as a function of ω (related to Theorem 10). Remark 5: The optimum Pareto minimal power reallocation vector is not unique. However, the corresponding set has a nested structure, and relying on any member of the set will be associated with [PITH_FULL_IMAGE:figures/full_fig_p020_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: Segment of the boundary capturing the weighted sum-rate over the two-user phase where [PITH_FULL_IMAGE:figures/full_fig_p024_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: First step moving counterclockwise from the corner point with maximum [PITH_FULL_IMAGE:figures/full_fig_p042_7.png] view at source ↗
read the original abstract

This article shows that the capacity region of a two users weak Gaussian interference channel can be achieved using single letter Gaussian code-books. The approach relies on traversing the boundary in incremental steps. Starting from a corner point with Gaussian code-books, and relying on calculus of variation, it is shown that the end point in each step is achieved using Gaussian code-books. Optimality of Gaussian code-books is first established by limiting the random coding to independent and identically distributed scalar (single-letter) samples. Then, it is shown that the value of any optimum solution for vector inputs does not exceed that of the single-letter case. It is also shown that the maximum number of phases needed to realize the optimum time-sharing is two. It is established that the solution to the Han-Kobayashi achievable rate region, with single letter Gaussian code-books, achieves the optimum boundary. Even though the article focuses on weak interference, the results are applicable to the general case.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 1 minor

Summary. The manuscript claims to prove that the capacity region of the two-user weak Gaussian interference channel is achieved by the Han-Kobayashi region using single-letter Gaussian codebooks. The argument starts from a known Gaussian corner point, traverses the boundary in incremental steps via calculus of variations to preserve Gaussian optimality at each endpoint, shows that vector-input optima cannot exceed the single-letter value, establishes that at most two time-sharing phases suffice, and concludes that Gaussian HK meets capacity (with a claim of applicability to the general case).

Significance. If rigorously established, the result would be significant for information theory, as it would characterize the capacity region of the weak Gaussian interference channel (a long-standing open problem) via Gaussian codebooks. The boundary-traversal technique with variations, if shown to have only Gaussian stationary points, could offer a new tool for proving optimality in interference channels. The manuscript receives credit for outlining a structured approach from an external corner point and for addressing time-sharing cardinality.

major comments (3)
  1. [Abstract] Abstract (proof strategy paragraph): the calculus-of-variations step that concludes each successive boundary endpoint remains Gaussian-optimal is load-bearing but unsupported by explicit verification that the mutual-information functionals (under weak-interference channel law and power constraints) admit no non-Gaussian critical points.
  2. [Abstract] Abstract (vector-input paragraph): the claim that 'the value of any optimum solution for vector inputs does not exceed that of the single-letter case' is asserted without the required bounding argument or error analysis, undermining the reduction from block length n to single-letter.
  3. [Abstract] Abstract (time-sharing paragraph): the assertion that 'the maximum number of phases needed to realize the optimum time-sharing is two' depends on the preceding reductions and requires an explicit derivation showing why more phases cannot improve the boundary.
minor comments (1)
  1. [Abstract] The final sentence claiming applicability to the general (strong) interference case should be justified or removed, as the weak-interference assumption appears essential to the variation argument.

Simulated Author's Rebuttal

3 responses · 0 unresolved

We thank the referee for the careful review and constructive comments on our manuscript. We address each major comment below and will revise the manuscript accordingly to improve explicitness and rigor.

read point-by-point responses
  1. Referee: [Abstract] the calculus-of-variations step that concludes each successive boundary endpoint remains Gaussian-optimal is load-bearing but unsupported by explicit verification that the mutual-information functionals (under weak-interference channel law and power constraints) admit no non-Gaussian critical points.

    Authors: We agree the abstract is concise. The manuscript applies calculus of variations to the mutual information expressions under the given channel law and constraints. To strengthen the presentation, the revised version will include an explicit lemma or appendix verifying that the only critical points are Gaussian, via direct computation of the functional derivative and analysis of the second variation. revision: yes

  2. Referee: [Abstract] the claim that 'the value of any optimum solution for vector inputs does not exceed that of the single-letter case' is asserted without the required bounding argument or error analysis, undermining the reduction from block length n to single-letter.

    Authors: The manuscript contains a bounding argument based on the memoryless Gaussian channel and mutual information properties showing vector optima cannot exceed the single-letter value. We will expand this section in revision with a more detailed derivation, including explicit error bounds for the n-to-single-letter reduction. revision: yes

  3. Referee: [Abstract] the assertion that 'the maximum number of phases needed to realize the optimum time-sharing is two' depends on the preceding reductions and requires an explicit derivation showing why more phases cannot improve the boundary.

    Authors: We will add an explicit derivation in the revised manuscript. Given the boundary traversal and the convex structure of the achievable region under the Han-Kobayashi scheme, any time-sharing solution with more than two phases can be reduced to two phases without rate loss, which will be shown via a supporting lemma on the geometry of the rate region. revision: yes

Circularity Check

0 steps flagged

No significant circularity detected

full rationale

The derivation begins from an external known Gaussian corner point of the Han-Kobayashi region and applies calculus of variations to traverse the boundary while establishing single-letter Gaussian optimality before separately proving that vector-input optima cannot exceed the single-letter value. No quoted equations or self-citations reduce any load-bearing claim to a definition, fitted input, or prior author result by construction; the argument is self-contained against the stated external benchmarks.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

Based solely on the abstract, the paper relies on standard information-theoretic definitions and the Han-Kobayashi framework without introducing new free parameters or invented entities; the calculus of variations is treated as a standard tool.

axioms (2)
  • standard math Standard definitions of mutual information, achievable rates, and capacity region in multi-user information theory
    Invoked to define the capacity region and Han-Kobayashi achievable rates.
  • domain assumption Applicability of calculus of variations to optimization over rate boundaries in Gaussian channels
    Used to show that incremental steps preserve Gaussian optimality.

pith-pipeline@v0.9.0 · 5694 in / 1315 out tokens · 86288 ms · 2026-05-23T05:20:46.328920+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

46 extracted references · 46 canonical work pages

  1. [1]

    Introduction to the Calculus of Variations

    H. Sagan, “Introduction to the Calculus of Variations”,Dover Books on Mathematics, 1992

  2. [2]

    On degraded Gaussian two-user channels (Corresp.),

    H. Sato, “On degraded Gaussian two-user channels (Corresp.)," inIEEE Transactions on Infor- mation Theory, vol. 24, no. 5, pp. 637-640, September 1978

  3. [3]

    The capacity of the Gaussian interference channel under strong interference (Corresp.),

    H. Sato, “The capacity of the Gaussian interference channel under strong interference (Corresp.)," inIEEE Transactions on Information Theory, vol. 27, no. 6, pp. 786-788, November 1981

  4. [4]

    On the Gaussian interference channel,

    M. Costa, “On the Gaussian interference channel," inIEEE Transactions on Information Theory, vol. 31, no. 5, pp. 607-615, September 1985

  5. [5]

    A new achievable rate region for the interference channel,

    T. S. Han and K. Kobayashi, “A new achievable rate region for the interference channel," inIEEE Transactions on Information Theory, vol. 27, no. 1, pp. 49-60, January 1981

  6. [6]

    On achievable rate regions for the Gaussian interference channel,

    I. Sason, “On achievable rate regions for the Gaussian interference channel," inIEEE Transactions on Information Theory, vol. 50, no. 6, pp. 1345-1356, June 2004

  7. [7]

    On the Achievable Rate Regions for Interference Channels With Degraded Message Sets,

    J. Jiang and Y. Xin, “On the Achievable Rate Regions for Interference Channels With Degraded Message Sets," inIEEE Transactions on Information Theory, vol. 54, no. 10, pp. 4707-4712, Oct. 2008 43

  8. [8]

    Invariance of the Han–Kobayashi Region With Respect to Temporally- Correlated Gaussian Inputs,

    C. Nair and D. Ng, “Invariance of the Han–Kobayashi Region With Respect to Temporally- Correlated Gaussian Inputs," inIEEE Transactions on Information Theory, vol. 65, no. 3, pp. 1372-1374, March 2019

  9. [9]

    On The Han–Kobayashi Region for the Interference Channel,

    H. Chong, M. Motani, H. K. Garg and H. El Gamal, “On The Han–Kobayashi Region for the Interference Channel," inIEEE Transactions on Information Theory, vol. 54, no. 7, pp. 3188- 3195, July 2008

  10. [10]

    Sub-optimality of Han-Kobayashi achievable region for interference channels,

    C. Nair, L. Xia and M. Yazdanpanah, “Sub-optimality of Han-Kobayashi achievable region for interference channels,"2015 IEEE International Symposium on Information Theory(ISIT), Hong Kong, 2015, pp. 2416-2420

  11. [11]

    Outer bounds on the capacity of interference channels (Corresp.),

    A. Carleial, “Outer bounds on the capacity of interference channels (Corresp.)," inIEEE Trans- actions on Information Theory, vol. 29, no. 4, pp. 602-606, July 1983

  12. [12]

    Outer bounds on the capacity of Gaussian interference channels,

    G. Kramer, “Outer bounds on the capacity of Gaussian interference channels," inIEEE Transac- tions on Information Theory, vol. 50, no. 3, pp. 581-586, March 2004

  13. [13]

    Capacity Bounds for the Gaussian Interference Channel,

    A. S. Motahari and A. K. Khandani, “Capacity Bounds for the Gaussian Interference Channel," inIEEE Transactions on Information Theory, vol. 55, no. 2, pp. 620-643, Feb. 2009

  14. [14]

    A New Outer Bound and the Noisy-Interference Sum–Rate Capacity for Gaussian Interference Channels,

    X. Shang, G. Kramer and B. Chen, “A New Outer Bound and the Noisy-Interference Sum–Rate Capacity for Gaussian Interference Channels," inIEEE Transactions on Information Theory, vol. 55, no. 2, pp. 689-699, Feb. 2009

  15. [15]

    Gaussian Interference Networks: Sum Capacity in the Low-Interference Regime and New Outer Bounds on the Capacity Region,

    V. S. Annapureddy and V. V. Veeravalli, “Gaussian Interference Networks: Sum Capacity in the Low-Interference Regime and New Outer Bounds on the Capacity Region," inIEEE Transactions on Information Theory, vol. 55, no. 7, pp. 3032-3050, July 2009

  16. [16]

    On the High-SNR Capacity of the Gaussian Interference Channel and New Capacity Bounds,

    J. Nam, “On the High-SNR Capacity of the Gaussian Interference Channel and New Capacity Bounds," inIEEE Transactions on Information Theory, vol. 63, no. 8, pp. 5266-5285, Aug. 2017

  17. [17]

    Wasserstein Continuity of Entropy and Outer Bounds for Interference Channels,

    Y. Polyanskiy and Y. Wu, “Wasserstein Continuity of Entropy and Outer Bounds for Interference Channels," inIEEE Transactions on Information Theory, vol. 62, no. 7, pp. 3992-4002, July 2016

  18. [18]

    Bounds on the Capacity Region for a Class of Interference Channels With Common Information,

    H. P. Romero and M. K. Varanasi, “Bounds on the Capacity Region for a Class of Interference Channels With Common Information," inIEEE Transactions on Information Theory, vol. 59, no. 8, pp. 4811-4818, Aug. 2013

  19. [19]

    Interference Channels With Common Information,

    J. Jiang, Y. Xin and H. K. Garg, “Interference Channels With Common Information," inIEEE Transactions on Information Theory, vol. 54, no. 1, pp. 171-187, Jan. 2008

  20. [20]

    Interference Channels With Source Cooperation,

    V. M. Prabhakaran and P. Viswanath, “Interference Channels With Source Cooperation," inIEEE Transactions on Information Theory, vol. 57, no. 1, pp. 156-186, Jan. 2011

  21. [21]

    Interference Channels With Destination Cooperation,

    V. M. Prabhakaran and P. Viswanath, “Interference Channels With Destination Cooperation," in IEEE Transactions on Information Theory, vol. 57, no. 1, pp. 187-209, Jan. 2011 44

  22. [22]

    Novel Outer Bounds and Capacity Results for the Interference Channel With Conferencing Receivers,

    R. K. Farsani and A. K. Khandani, “Novel Outer Bounds and Capacity Results for the Interference Channel With Conferencing Receivers," inIEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3327-3341, June 2020

  23. [23]

    Layered Coding for Interference Channels With Partial Transmitter Side Information,

    P. S. C. Thejaswi, A. Bennatan, J. Zhang, A. R. Calderbank and D. Cochran, “Layered Coding for Interference Channels With Partial Transmitter Side Information," inIEEE Transactions on Information Theory, vol. 57, no. 5, pp. 2765-2780, May 2011

  24. [24]

    Interference Channels With Correlated Receiver Side Information,

    N. Liu, D. Gündüz, A. J. Goldsmith and H. V. Poor, “Interference Channels With Correlated Receiver Side Information," inIEEE Transactions on Information Theory, vol. 56, no. 12, pp. 5984-5998

  25. [25]

    Capacity Bounds and Exact Results for the Cognitive Z-Interference Channel,

    N. Liu, I. Maric, A. J. Goldsmith and S. Shamai, “Capacity Bounds and Exact Results for the Cognitive Z-Interference Channel," inIEEE Transactions on Information Theory, vol. 59, no. 2, pp. 886-893, Feb. 2013

  26. [26]

    Capacity of Cognitive Inter- ference Channels With and Without Secrecy,

    Y. Liang, A. Somekh-Baruch, H. V. Poor, S. Shamai and S. Verdu, “Capacity of Cognitive Inter- ference Channels With and Without Secrecy," inIEEE Transactions on Information Theory, vol. 55, no. 2, pp. 604-619, Feb. 2009

  27. [27]

    Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference Channels,

    X. Shang, B. Chen, G. Kramer and H. V. Poor, “Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference Channels," inIEEE Transactions on Information Theory, vol. 56, no. 10, pp. 5030-5044, Oct. 2010

  28. [28]

    Noisy-Interference Sum-Rate Capacity of Parallel Gaussian Interference Channels,

    X. Shang, B. Chen, G. Kramer and H. V. Poor, “Noisy-Interference Sum-Rate Capacity of Parallel Gaussian Interference Channels," inIEEE Transactions on Information Theory, vol. 57, no. 1, pp. 210-226, Jan. 2011

  29. [29]

    Feedback strategies for white Gaussian interference networks,

    G. Kramer, “Feedback strategies for white Gaussian interference networks," inIEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1423-1438, June 2002

  30. [30]

    Gaussian Interference Channel Capacity to Within One Bit,

    R. H. Etkin, D. N. C. Tse and H. Wang, “Gaussian Interference Channel Capacity to Within One Bit," inIEEE Transactions on Information Theory, vol. 54, no. 12, pp. 5534-5562, Dec. 2008

  31. [31]

    To Decode the Interference or to Consider It as Noise,

    A. S. Motahari and A. K. Khandani, “To Decode the Interference or to Consider It as Noise," in IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1274-1283, March 2011

  32. [32]

    Interference as Noise: Friend or Foe?,

    A. Dytso, D. Tuninetti and N. Devroye, “Interference as Noise: Friend or Foe?," inIEEE Trans- actions on Information Theory, vol. 62, no. 6, pp. 3561-3596, June 2016

  33. [33]

    Shannon Meets Nash on the Interference Channel,

    R. A. Berry and D. N. C. Tse, “Shannon Meets Nash on the Interference Channel," inIEEE Transactions on Information Theory, vol. 57, no. 5, pp. 2821-2836, May 2011

  34. [34]

    Sliding-Window Superposition Coding: Two-User Interference Channels,

    L. Wang, Y. Kim, C. Chen, H. Park and E. Şaşoğlu, “Sliding-Window Superposition Coding: Two-User Interference Channels," inIEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3293-3316, June 2020 45

  35. [35]

    The capacity region of a class of 3-receiver broadcast channels with degraded message sets,

    C. Nair and A. El Gamal, “The capacity region of a class of 3-receiver broadcast channels with degraded message sets,”IEEE Transactions on Information Theory, vol. 55, no. 10, pp. 4479–4493, Oct. 2009

  36. [36]

    On the Han-Kobayashi region for the interference channel,

    H. F. Chong, M. Motani, H. K. Garg, and H. El Gamal, “On the Han-Kobayashi region for the interference channel,”IEEE Transactions on Information Theory, vol. 57, no. 7, pp. 3188–3195, Jul. 2008

  37. [37]

    Is Non-Unique Decoding Necessary?,

    S. S. Bidokhti and V. M. Prabhakaran, “Is Non-Unique Decoding Necessary?," inIEEE Transac- tions on Information Theory, vol. 60, no. 5, pp. 2594-2610, May 2014

  38. [38]

    Information Dimension and the Degrees of Freedom of the Interference Channel,

    Y. Wu, S. Shamai Shitz and S. Verdú, "Information Dimension and the Degrees of Freedom of the Interference Channel," in IEEE Transactions on Information Theory, vol. 61, no. 1, pp. 256-279, Jan. 2015

  39. [39]

    State-Dependent Gaussian Interference Channels: Can State Be Fully Canceled?,

    R. Duan, Y. Liang and S. Shamai, “State-Dependent Gaussian Interference Channels: Can State Be Fully Canceled?," inIEEE Transactions on Information Theory, vol. 62, no. 4, pp. 1957-1970, April 2016

  40. [40]

    State-Dependent Interference Channel With Correlated States,

    Y. Sun, R. Duan, Y. Liang and S. Shamai Shitz, “State-Dependent Interference Channel With Correlated States," inIEEE Transactions on Information Theory, vol. 65, no. 7, pp. 4518-4531, July 2019

  41. [41]

    A Proof of the Noiseberg Conjecture for the Gaussian Z-Interference Channel,

    M. Costa, A. Gohari, C. Nair and D. Ng, "A Proof of the Noiseberg Conjecture for the Gaussian Z-Interference Channel,"IEEE International Symposium on Information Theory(ISIT), 2023, pp. 1824-1829

  42. [42]

    Costa, C

    M. Costa, C. Nair, D. Ng, and Y. N. Wang, ”On the structure of certain non-convex functionals and the Gaussian Z-interference channel,”IEEE International Symposium on Information Theory (ISIT), 2020, pp. 1522–1527

  43. [43]

    Gallager, John Wiley & Sons, 1968

    Information Theory and Reliable communication, by Robert G. Gallager, John Wiley & Sons, 1968

  44. [44]

    Elements of Information Theory, Second Edition, by T. M. Cover and J. A. Thomas, John Wiley & Sons, 2006

  45. [45]

    Multiaccess fading channels. I. Polymatroid structure, optimal resource allocation and throughput capacities,

    D. N. C. Tse and S. V. Hanly, “Multiaccess fading channels. I. Polymatroid structure, optimal resource allocation and throughput capacities,"IEEE Transactions on Information Theory, vol. 44, no. 7, pp. 2796-2815, Nov. 1998

  46. [46]

    Fairness in Multiuser Systems With Polymatroid Capacity Region,

    M. A. Maddah-Ali, A. Mobasher and A. K. Khandani, “Fairness in Multiuser Systems With Polymatroid Capacity Region,"IEEE Transactions on Information Theory, vol. 55, no. 5, pp. 2128-2138, May 2009