On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

被引:0
|
作者
Cui, Tao [1 ]
Ho, Tracey [1 ]
Kliewer, Joerg [2 ]
机构
[1] CALTECH, Dept Elect Engn, Pasadena, CA 91125 USA
[2] New Mexico State Univ, Klipsch Sch Elect & Comp Engn, Las Cruces, NM 88003 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We address secure network coding over networks with unequal link capacities in the presence of a wiretapper who has only access to a restricted number of k links in the network. Previous results show that for the case of equal link capacities and unrestricted wiretapping sets, the secrecy capacity is given by the cut-set bound, whether or not the location of the wiretapped links is known. The cut-set bound can be achieved by injecting k random keys at the source which are decoded at the sink along with the message. In contrast, for the case where the wiretapping set is restricted, or where link capacities are not equal, we show that the cut-set bound is not achievable in general. Finally, it is shown that determining the secrecy capacity is a NP-hard problem.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Strongly Secure Linear Network Coding
    Harada, Kunihiko
    Yamamoto, Hirosuke
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2720 - 2728
  • [42] A Secure Broadcasting Scheme with Network Coding
    Wang, Xiao
    Guo, Wangmei
    Yang, Yanbo
    Wang, Bin
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (07) : 1435 - 1438
  • [43] Secure Network Coding over the Integers
    Gennaro, Rosario
    Katz, Jonathan
    Krawczyk, Hugo
    Rabin, Tal
    PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 142 - +
  • [44] Efficiency of rateless secure network coding
    Franz, Elke
    Pfennig, Stefan
    Reiher, Tobias
    CONFERENCE ON ELECTRONICS, TELECOMMUNICATIONS AND COMPUTERS - CETC 2013, 2014, 17 : 162 - 169
  • [45] An Efficient Construction of Secure Network Coding
    ZHANG Jing-li
    TANG Ping
    MA Song-ya
    数学季刊(英文版), 2016, 31 (01) : 60 - 68
  • [46] Universal Weakly Secure Network Coding
    Silva, Danilo
    Kschischang, Frank R.
    ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, 2009, : 281 - 285
  • [47] Secure Network Coding with Erasures and Feedback
    Czap, Laszlo
    Fragouli, Christina
    Prabhakaran, Vinod M.
    Diggavi, Suhas
    2013 51ST ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2013, : 1517 - 1524
  • [48] Secure network coding in the presence of eavesdroppers
    LUO MingXing1
    2Key Laboratory of Network and Information Attack and Defence Technology of MOE
    3National Engineering Laboratory for Disaster Backup and Recovery
    Science China(Information Sciences), 2010, 53 (03) : 648 - 658
  • [49] Secure network coding in the presence of eavesdroppers
    MingXing Luo
    YiXian Yang
    LiCheng Wang
    XinXin Niu
    Science China Information Sciences, 2010, 53 : 648 - 658
  • [50] Capacity bounds for secure network coding
    Chan, Terence
    Grant, Alex
    2008 AUSTRALIAN COMMUNICATIONS THEORY WORKSHOP, 2008, : 95 - 100