2011
DOI: 10.1109/tit.2010.2090212
|View full text |Cite
|
Sign up to set email alerts
|

Universal Secure Network Coding via Rank-Metric Codes

Abstract: Abstract-The problem of securing a network coding communication system against an eavesdropper adversary is considered. The network implements linear network coding to deliver n packets from source to each receiver, and the adversary can eavesdrop on µ arbitrarily chosen links. The objective is to provide reliable communication to all receivers, while guaranteeing that the source information remains information-theoretically secure from the adversary. A coding scheme is proposed that can achieve the maximum po… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
166
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(169 citation statements)
references
References 27 publications
2
166
1
Order By: Relevance
“…We will consider the secret message S to be a uniform random variable in S = F αm×ℓ q , and we will consider noisy wire-tap channels (which can also be thought of as distributed storage systems) as given in [22]: Definition 1 (Coherent linearized channel [22]). We define a coherent linearized noisy wire-tap channel with t errors, ρ erasures with erasure matrix A ∈ F N ×n q of rank at least n−ρ, and µ observations as a channel with input a variable X ∈ X = F αm×n q , output to the receiver Y ∈ Y = F αm×N q , and output to the eavesdropper W ∈ W = F αm×µ q , together with a conditional probability distribution P (Y, W |X) such that…”
Section: Coherent Linearized Channels and Coset Coding Schemesmentioning
confidence: 99%
See 2 more Smart Citations
“…We will consider the secret message S to be a uniform random variable in S = F αm×ℓ q , and we will consider noisy wire-tap channels (which can also be thought of as distributed storage systems) as given in [22]: Definition 1 (Coherent linearized channel [22]). We define a coherent linearized noisy wire-tap channel with t errors, ρ erasures with erasure matrix A ∈ F N ×n q of rank at least n−ρ, and µ observations as a channel with input a variable X ∈ X = F αm×n q , output to the receiver Y ∈ Y = F αm×N q , and output to the eavesdropper W ∈ W = F αm×µ q , together with a conditional probability distribution P (Y, W |X) such that…”
Section: Coherent Linearized Channels and Coset Coding Schemesmentioning
confidence: 99%
“…We now give the details of Example 1 and Example 2, which share the same construction: With the given parameters, the construction in [22,Th. 11] gives ℓ = 16 by choosing k 1 = 24 and k 2 = 8.…”
Section: Definition 9 ([8 21])mentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, it has received much attention and has been generated huge research in communication networks [2]. TCP/NC [3] is the first one that incorporates network coding into TCP with minor changes to the protocol stack.…”
Section: Introductionmentioning
confidence: 99%
“…One approach to dealing with untrusted networks is to impose strict security requirements, namely, to require that the network nodes learn nothing about the source messages. We can indeed use secure network coding designs [1], [2], [3], [4], [5], [6] to protect from a passive eavesdropper, Eve, who has access to at most k edges of the network; in our setting, where Eve has access to a network node, k would be the number of incoming edges in Eve's node. The security comes at the cost of throughput; namely, applying the techniques of [1]- [6], we cannot hope to achieve an information rate higher than h − k. Thus, if Eve's node has the same min-cut as a receiver, our throughput becomes zero.…”
Section: Introductionmentioning
confidence: 99%