2019
DOI: 10.1109/tcomm.2018.2870831
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: The principal mission of Multi-Source Multicast (MSM) is to disseminate all messages from all sources in a network to all destinations. MSM is utilized in numerous applications. In many of them, securing the messages disseminated is critical.A common secure model is to consider a network where there is an eavesdropper which is able to observe a subset of the network links, and seek a code which keeps the eavesdropper ignorant regarding all the messages. While this is solved when all messages are located at a s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 65 publications
(60 reference statements)
0
12
0
Order By: Relevance
“…In an effort to increase the efficiency in terms of rate, yet another relaxation of the perfect secrecy of Shannon was introduced, namely individual secrecy [25]- [36]. This is best explained in a network setup, where Alice has many messages to send to Bob, say M 1 , .…”
Section: Arxiv:200901931v1 [Csit] 3 Sep 2020mentioning
confidence: 99%
See 2 more Smart Citations
“…In an effort to increase the efficiency in terms of rate, yet another relaxation of the perfect secrecy of Shannon was introduced, namely individual secrecy [25]- [36]. This is best explained in a network setup, where Alice has many messages to send to Bob, say M 1 , .…”
Section: Arxiv:200901931v1 [Csit] 3 Sep 2020mentioning
confidence: 99%
“…While there is no doubt that efficient rates are beneficial, the assumptions of physical layer security, namely that Eve does not experience a worse channel than Bob, are hard to enforce in practice. Figure 2 depicts a simple example of secure postquantum candidates for multipath networks based on the following security solutions considered in the literature we elaborated above, (a) One-time pad [1] (b) McEliece cryptosystem [12] (c) Network coding wiretap II [20] (d) Individual Security for networks [36].…”
Section: Arxiv:200901931v1 [Csit] 3 Sep 2020mentioning
confidence: 99%
See 1 more Smart Citation
“…It is hybrid in that it combines information-theoretic security with a public-key cryptosystem, and is universal in that it can be applied to any communication system. HUNCC works by first premixing the data using a particular type of secure network coding scheme [6] and then encrypting a small part of the mixed data before Each approach provides different trade-offs between security, throughput, and in-order delivery delay. After receiving enough packets, Bob can retrieve the encoded messages, decrypt X 1 = D(E(X 1 , p), s), and finally, decode the original messages.…”
Section: Introductionmentioning
confidence: 99%
“…Network coding is a widely studied technique for multisource, multicast scenarios [11][12][13][14][15]. In comparison to the conventional multicast solution, which requires group management protocols and construction of multicast trees, the network coding can achieve multicast using a feasible coding scheme computable in polynomial time [11,12].…”
Section: Introductionmentioning
confidence: 99%