2012
DOI: 10.1109/tit.2012.2188777
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Index Coding With Side Information

Abstract: Security aspects of the Index Coding with Side Information (ICSI) problem are investigated. Building on the results of Bar-Yossef et al. (2006), the properties of linear index codes are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security.It is shown that the linear index code based on a matrix L, whose column space code C(L) has length n, minimum distance d and dual distance d ⊥ , is (d − 1 − t)-block secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
79
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 70 publications
(80 citation statements)
references
References 28 publications
(53 reference statements)
1
79
0
Order By: Relevance
“…Since receiver ∅ is missing, we start by skipping some message a ∈ [1 : m]. We choose any a ∈ [1 : m]\ H ∈U abs H, which is possible due to (5). After this step, for any decoding choice D, Algorithm 1 must terminate without skipping any more messages (meaning that it will not hit any absent receiver).…”
Section: Results On Optimal Broadcast Ratesmentioning
confidence: 99%
See 1 more Smart Citation
“…Since receiver ∅ is missing, we start by skipping some message a ∈ [1 : m]. We choose any a ∈ [1 : m]\ H ∈U abs H, which is possible due to (5). After this step, for any decoding choice D, Algorithm 1 must terminate without skipping any more messages (meaning that it will not hit any absent receiver).…”
Section: Results On Optimal Broadcast Ratesmentioning
confidence: 99%
“…In index coding, the sender is assumed to have m messages and each receiver knows a subset of the m messages and wants a specific subset of messages it does not know. Index coding [1]- [4], its secure variant [5,6], and its connection to network coding [7]- [9] have received significant research interest.…”
Section: Introductionmentioning
confidence: 99%
“…It is known that the smallest possible scalar linear index coding rate is equal to minrk q (G) [1], [11]. We also know from [1], [11] that a matrix L L L is a valid encoder matrix for G if and only if for each receiver i ∈ [N ], there exists a vector u u u i ∈ F N q such that u u u i K i and u u u i + e e e i ∈ C(L L L), where C denotes the column span of a matrix. If L L L is a valid encoder matrix, stacking these vectors we obtain the N × N matrix A A A = [u u u 1 + e e e 1 u u u 2 + e e e 2 · · · u u u N + e e e N ] .…”
Section: B Scalar Linear Index Codes With Local Decodabilitymentioning
confidence: 99%
“…It is known that the smallest possible scalar linear index coding rate is equal to minrk q (G) [2], [24]. We also know from [2], [24] that a matrix L L L is a valid encoder matrix for G if and only if for each receiver i ∈ [N ], there exists a vector u u u i ∈ F N q such that u u u i K i and u u u i + e e e i ∈ C(L L L), where C denotes the column span of a matrix. If L L L is a valid encoder matrix, stacking these vectors we obtain the N × N matrix A A A = [u u u 1 + e e e 1 u u u 2 + e e e 2 · · · u u u N + e e e N ] .…”
Section: A Preliminaries: Locally Decodable Scalar Linear Index Codesmentioning
confidence: 99%