Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys
Abstract
It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to z network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate is well understood. Computing the secure multicast rate, or even the secure unicast rate, in the more general setting in which all network nodes may generate (independent) random keys is known to be as difficult as computing the (non-secure) capacity of multiple-unicast network coding instances — a well known open problem. This work treats an intermediate model of secure unicast in which only one node can generate random keys, however that node need not be the source node. The secure communication rate for this setting is characterized again with an eavesdropper that has access to z network links.
Additional Information
© 2019 IEEE. Work supported in part by NSF grants CCF-1526771 and CCF-1817241.Attached Files
Submitted - 1907.03522.pdf
Files
Name | Size | Download all |
---|---|---|
md5:3075a5b773dcbcf874768a88859146b9
|
249.5 kB | Preview Download |
Additional details
- Eprint ID
- 99081
- DOI
- 10.1109/isit.2019.8849665
- Resolver ID
- CaltechAUTHORS:20191004-100333424
- NSF
- CCF-1526771
- NSF
- CCF-1817241
- Created
-
2019-10-04Created from EPrint's datestamp field
- Updated
-
2021-11-16Created from EPrint's last_modified field