2021
DOI: 10.1109/jsait.2021.3053697
|View full text |Cite
|
Sign up to set email alerts
|

Secure Non-Linear Network Code Over a One-Hop Relay Network

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(14 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…This result can be regarded as a kind of reduction theorem because the secrecy analysis with contamination can be reduced to that without contamination. Indeed, when the linearity is not imposed, there is a counterexample of this reduction theorem [21].…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…This result can be regarded as a kind of reduction theorem because the secrecy analysis with contamination can be reduced to that without contamination. Indeed, when the linearity is not imposed, there is a counterexample of this reduction theorem [21].…”
Section: Discussionmentioning
confidence: 99%
“…Hence, to guarantee the secrecy under an arbitrary active attack, it is sufficient to show secrecy under the passive attack. However, there is an example of non-linear network such that this kind of reduction does not hold [21]. In fact, even when the network does not have synchronization so that the information transmission on an edges starts before the end of the information transmission on the previous edge, the above reduction theorem hold under the uniqueness condition.…”
Section: Lemmamentioning
confidence: 97%
See 3 more Smart Citations