A Secure Broadcasting Scheme with Network Coding

被引:7
|
作者
Wang, Xiao [1 ]
Guo, Wangmei [1 ]
Yang, Yanbo [1 ]
Wang, Bin [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Secure network coding; broadcasting; perfect secrecy; coding field size;
D O I
10.1109/LCOMM.2013.060513.130684
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We consider the secure broadcasting network coding problem over an acyclic network with single source node and two sink nodes. The secret message consists of two private messages and one common message. Secure means that no information about the secret message leaks to the adversary, that is, it achieves the perfect secure and belongs to information theoretic secure. Broadcasting means that different sink nodes receive different parts of the secret message. Given a network topology and network codes, a secure broadcasting scheme is proposed based on the signal space of sink nodes. The secret message is perfect secure if a limited number of edges are wiretapped by adversary. Analysis shows that our scheme is admissible. And the upper bound of the secrecy broadcasting capacity region can be achieved by our scheme. Besides, the sufficient condition of existence for our scheme, i.e., the lower bound of the coding field size, is also derived.
引用
收藏
页码:1435 / 1438
页数:4
相关论文
共 50 条
  • [1] Refined Secure Network Coding Scheme with no Restriction on Coding Vectors
    Kim, Young-Sik
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (11) : 1907 - 1910
  • [2] A Weakly-Secure and Reliable Network Coding Scheme
    Wu, Hao
    Li, Hui
    Song, Mengjing
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 23 - 29
  • [3] Homomorphic Subspace MAC Scheme for Secure Network Coding
    Liu, Guangjun
    Wang, Xiao
    ETRI JOURNAL, 2013, 35 (01) : 173 - 176
  • [4] A secure quantum network coding scheme with identity authentication
    Shang, Tao, 1600, American Scientific Publishers (12):
  • [5] A Lightweight Secure Network Coding Scheme against Wiretapping
    LIU Guangjun
    LIU Ximeng
    XIONG Jinbo
    ZHOU Hang
    WuhanUniversityJournalofNaturalSciences, 2014, 19 (02) : 156 - 160
  • [6] How to Construct Strongly Secure Network Coding Scheme
    Kurosawa, Kaoru
    Ohta, Hiroyuki
    Kakuta, Kenji
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 1 - 17
  • [7] Secure network coding scheme for scalable video streaming
    Liu, X.-M., 1600, Editorial Board of Journal on Communications (34):
  • [8] A Practical HARQ Scheme with Network Coding for LTE-A Broadcasting System
    Lv, Zhenxing
    Xu, Kui
    Xu, Youyun
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [9] An efficient MAC scheme for secure network coding with probabilistic detection
    Boyang Wang
    Hui Li
    Jin Cao
    Frontiers of Computer Science, 2012, 6 : 429 - 441
  • [10] A New Efficient and Secure POR Scheme Based on Network Coding
    Omote, Kazumasa
    Tran Phuong Thao
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 98 - 105