On Secure Network Coding with Uniform Wiretap Sets

被引:0
|
作者
Huang, Wentao [1 ]
Ho, Tracey [1 ]
Langberg, Michael
Kliewer, Joerg
机构
[1] CALTECH, Pasadena, CA 91125 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies secure unicast communication over a network with uniform wiretap sets and shows that, when network nodes can independently generate randomness, determining the secrecy capacity is at least as difficult as the k-unicast network coding problem. In particular, we show that a general k-unicast problem can be reduced to the problem of finding the secrecy capacity of a corresponding single unicast network with uniform link capacities and any one wiretap link. We propose a low-complexity linear optimization-based achievable strategy involving global random keys that can be generated anywhere in the network, and an efficient greedy algorithm that further improves achieveable rate by exploiting local random keys.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] On Secure Network Coding With Nonuniform or Restricted Wiretap Sets
    Cui, Tao
    Ho, Tracey
    Kliewer, Joerg
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 166 - 176
  • [2] Secure Network Coding on a Wiretap Network
    Cai, Ning
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) : 424 - 435
  • [3] Secure random linear network coding on a wiretap network
    Cao, Zhanghua
    Zhang, Shibing
    Ji, Xiaodong
    Zhang, Lai
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2015, 69 (01) : 467 - 472
  • [4] A Secure Network Coding System Against Wiretap Attacks
    Wang Xuebing
    Qin Na
    Liu Yantao
    [J]. 2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 62 - 67
  • [5] Secure Network Coding for Wiretap Networks of Type II
    El Rouayheb, Salim
    Soljanin, Emina
    Sprintson, Alex
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (03) : 1361 - 1371
  • [6] On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack
    Chang, Xiangmao
    Wang, Jin
    Wang, Jianping
    Lee, Victor
    Lu, Kejie
    Yang, Yixian
    [J]. 2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [7] Performance Bounds on a Wiretap Network With Arbitrary Wiretap Sets
    Cheng, Fan
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (06) : 3345 - 3358
  • [8] Secure Coding for Type II Quantum Wiretap Channel
    Heling Xiao
    Huifeng Wang
    [J]. International Journal of Theoretical Physics, 2018, 57 : 3318 - 3325
  • [9] Secure Polar Coding for the Primitive Relay Wiretap Channel
    Athanasakos, Manos
    Karagiannidis, George
    [J]. ENTROPY, 2021, 23 (04)
  • [10] Secure Coding for Type II Quantum Wiretap Channel
    Xiao, Heling
    Wang, Huifeng
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018, 57 (11) : 3318 - 3325