Secure Network Coding on a Wiretap Network

被引:146
|
作者
Cai, Ning [1 ]
Yeung, Raymond W. [1 ,2 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
[2] Chinese Univ Hong Kong, Inst Network Coding, Shatin, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Algebraic coding; cryptography; multicast; network coding; secret sharing; wiretap channel; ERROR-CORRECTION;
D O I
10.1109/TIT.2010.2090197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the network can be utilized. In this paper, we propose a model, call the wiretap network, that incorporates information security with network coding. In this model, a collection of subsets of the channels in the network is given, and a wiretapper is allowed to access any one (but not more than one) of these subsets without being able to obtain any information about the message transmitted. Our model includes secret sharing in classical cryptography as a special case. We present a construction of secure linear network codes that can be used provided a certain graph-theoretic condition is satisfied. We also prove the necessity of this condition for the special case that the wiretapper may choose to access any subset of channels of a fixed size. The optimality of our code construction is established for this special case. Finally, we extend our results to the scenario when the wiretapper is allowed to obtain a controlled amount of information about the message.
引用
收藏
页码:424 / 435
页数:12
相关论文
共 50 条
  • [21] Universally Secure Network Coding with Feedback
    Spini, Gabriele
    Zemor, Gilles
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2339 - 2343
  • [22] Efficiency of secure network coding schemes
    Franz, Elke
    Pfennig, Stefan
    Fischer, André
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7394 LNCS : 145 - 159
  • [23] Secure network coding with a cost criterion
    Tan, Jianlong
    Medard, Muriel
    [J]. 2006 4TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS, VOLS 1 AND 2, 2006, : 22 - +
  • [24] Strongly Secure Linear Network Coding
    Harada, Kunihiko
    Yamamoto, Hirosuke
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2720 - 2728
  • [25] A Secure Broadcasting Scheme with Network Coding
    Wang, Xiao
    Guo, Wangmei
    Yang, Yanbo
    Wang, Bin
    [J]. IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) : 1435 - 1438
  • [26] Secure Network Coding over the Integers
    Gennaro, Rosario
    Katz, Jonathan
    Krawczyk, Hugo
    Rabin, Tal
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 142 - +
  • [27] Universal Weakly Secure Network Coding
    Silva, Danilo
    Kschischang, Frank R.
    [J]. ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, 2009, : 281 - 285
  • [28] Efficiency of rateless secure network coding
    Franz, Elke
    Pfennig, Stefan
    Reiher, Tobias
    [J]. CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 162 - 169
  • [29] An Efficient Construction of Secure Network Coding
    ZHANG Jing-li
    TANG Ping
    MA Song-ya
    [J]. 数学季刊(英文版), 2016, 31 (01) : 60 - 68
  • [30] Secure Network Coding with Erasures and Feedback
    Czap, Laszlo
    Fragouli, Christina
    Prabhakaran, Vinod M.
    Diggavi, Suhas
    [J]. 2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2013, : 1517 - 1524