Secure Network Coding over Small Fields
نویسنده
چکیده
In the paradigm of network coding, the information-theoretic security problem is encountered in the presence of a wiretapper, who has capability of accessing an unknown channel-subset in communication networks. In order to combat this eavesdropping attack, secure network coding is introduced to prevent information from being leaked to adversaries. For any construction of secure linear network codes (SLNCs) over a wiretap network, the based field size is a very important index, because it largely determines the computational and space complexities, and further the efficiency of network transmission. Further, it is also very important for the process of secure network coding from theoretical research to practical applications. In the present paper, we proposed new lower bounds on the field size for constructing SLNCs, which shows that the field size can be reduced considerably without giving up any security and capacity. In addition, since the obtained lower bounds depend on network topology, how to efficiently determine them is another very important and attractive problem for explicit constructions of SLNCs. Motivated by a desire to develop methods with low complexity and empirical behavior to solve this problem, we propose efficient approaches and present a series of algorithms for implementation. Subsequently, the complexity of our algorithms is analyzed, which shows that they are polynomial-time.
منابع مشابه
Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients
We propose a new signature scheme that can be used to authenticate data and prevent pollution attacks in networks that use network coding. At its core, our system is a homomorphic signature scheme that authenticates vector subspaces of a given ambient space. Our system has several novel properties not found in previous proposals: • It is the first such scheme that authenticates vectors defined ...
متن کاملUniversal Strongly Secure Network Coding with Dependent and Non-Uniform Messages
We construct a secure network coding that is strongly secure in the sense of Harada and Yamamoto [19] and universal secure in the sense of Silva and Kschischang [28], [29], while allowing arbitrary small but nonzero mutual information to the eavesdropper. Our secure network coding allows statistically dependent and non-uniform multiple secret messages, while all previous constructions of weakly...
متن کاملAlgebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields
We introduce algebraic geometric techniques in secret sharing and in secure multi-party computation (MPC) in particular. The main result is a linear secret sharing scheme (LSSS) de ned over a nite eld Fq, with the following properties. 1. It is ideal. The number of players n can be as large as #C(Fq), where C is an algebraic curve C of genus g de ned over Fq. 2. It is quasi-threshold: it is t-r...
متن کاملSecure Network Coding via Filtered Secret Sharing∗
We study the problem of using a multicast network code to transmit information securely in the presence of a “wire-tap” adversary who can eavesdrop on a bounded number of network edges. We establish a close connection between secure linear network coding and a new variant of the secret sharing problem, which we call filtered secret sharing. Using this connection, we establish new trade-offs bet...
متن کاملScalable and High-Precision Function-Approximated Images and Its Secure Coding
Function-approximated images are suitable for transmission over the networks, because they can be scaled on the sidelines of various resolutions of network terminals with relatively small amount of information. In this work, we use the Fluency function-approximation method that utilizes the Fluency information theory. The theory can deal with images in scalable and high-precision. Transmitted i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1601.04503 شماره
صفحات -
تاریخ انتشار 2016