Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
نویسندگان
چکیده
We consider a communication network where there exist wiretappers who can access a subset of channels, called a wiretap set, which is chosen from a given collection of wiretap sets. The collection of wiretap sets can be arbitrary. Secure network coding is applied to prevent the source information from being leaked to the wiretappers. In secure network coding, the required alphabet size is an open problem not only of theoretical interest but also of practical importance, because it is closely related to the implementation of such coding schemes in terms of computational complexity and storage requirement. We develop a systematic graph-theoretic approach for improving Cai and Yeung's lower bound on the required alphabet size for the existence of secure network codes. The new lower bound thus obtained, which depends only on the network topology and the collection of wiretap sets, can be significantly smaller than Cai and Yeung's lower bound. A polynomial-time algorithm is devised for efficient computation of the new lower bound. Biography Xuan Guang received the Ph.D degree in mathematics from Chern Institute of Mathematics, Nankai University, Tianjin, China, in 2012. He was a visiting researcher and a Postdoctoral Research Fellow in Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA, from 2011 to 2012. Since Sep. 2012, he is a faculty member of the School of Mathematical Sciences, Nankai University, Tianjin, China. Currently, he is a Postdoctoral Fellow (Hong Kong Scholar’s Program) at the Institute of Network Coding, The Chinese University of Hong Kong, Hong Kong SAR, China. His main research interests include applied mathematics, information theory, and coding theory, in particular, network coding theory, network function computation and related areas. ** ALL ARE WELCOME ** Host: Professor Raymond W. Yeung (Tel: 3943-8375, Email: [email protected]) Enquiries: Department of Information Engineering, CUHK (Tel.: 3943-8388)
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملNetwork coding
In the network coding problem, there are k commodities each with an associated message Mi, a set of sources that know Mi and a set of sinks that request Mi. Each edge in the graph may transmit any function of the messages. These functions define a network coding solution. We explore three topics related to network coding. First, for a model in which the messages and the symbols transmitted on e...
متن کاملSecure Network Coding over Small Fields
In the paradigm of network coding, the information-theoretic security problem is encountered in the presence of a wiretapper, who has capability of accessing an unknown channel-subset in communication networks. In order to combat this eavesdropping attack, secure network coding is introduced to prevent information from being leaked to adversaries. For any construction of secure linear network c...
متن کاملStrongly Secure Linear Network Coding
In a network with capacity h for multicast, information Xh = (X1, X2, · · · , Xh) can be transmitted from a source node to sink nodes without error by a linear network code. Furthermore, secret information S r = (S 1, S 2, · · · , S r) can be transmitted securely against wiretappers by k-secure network coding for k ≤ h−r. In this case, no information of the secret leaks out even if an adversary...
متن کاملSparse Regression Codes
Developing computationally-efficient codes that approach the Shannon-theoretic limits for communication and compression has long been one of the major goals of information and coding theory. There have been significant advances towards this goal in the last couple of decades, with the emergence of turbo and sparse-graph codes in the ‘90s [1, 2], and more recently polar codes and spatially-coupl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1611.09104 شماره
صفحات -
تاریخ انتشار 2016