Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published July 2019 | Submitted
Book Section - Chapter Open

Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys

Abstract

It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to z network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate is well understood. Computing the secure multicast rate, or even the secure unicast rate, in the more general setting in which all network nodes may generate (independent) random keys is known to be as difficult as computing the (non-secure) capacity of multiple-unicast network coding instances — a well known open problem. This work treats an intermediate model of secure unicast in which only one node can generate random keys, however that node need not be the source node. The secure communication rate for this setting is characterized again with an eavesdropper that has access to z network links.

Additional Information

© 2019 IEEE. Work supported in part by NSF grants CCF-1526771 and CCF-1817241.

Attached Files

Submitted - 1907.03522.pdf

Files

1907.03522.pdf
Files (249.5 kB)
Name Size Download all
md5:3075a5b773dcbcf874768a88859146b9
249.5 kB Preview Download

Additional details

Created:
August 19, 2023
Modified:
October 18, 2023