196 research outputs found
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
By extending the notion of minimum rank distance, this paper introduces two
new relative code parameters of a linear code C_1 of length n over a field
extension and its subcode C_2. One is called the relative
dimension/intersection profile (RDIP), and the other is called the relative
generalized rank weight (RGRW). We clarify their basic properties and the
relation between the RGRW and the minimum rank distance. As applications of the
RDIP and the RGRW, the security performance and the error correction capability
of secure network coding, guaranteed independently of the underlying network
code, are analyzed and clarified. We propose a construction of secure network
coding scheme, and analyze its security performance and error correction
capability as an example of applications of the RDIP and the RGRW. Silva and
Kschischang showed the existence of a secure network coding in which no part of
the secret message is revealed to the adversary even if any dim C_1-1 links are
wiretapped, which is guaranteed over any underlying network code. However, the
explicit construction of such a scheme remained an open problem. Our new
construction is just one instance of secure network coding that solves this
open problem.Comment: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE
Transactions on Information Theor
Network Codes Resilient to Jamming and Eavesdropping
We consider the problem of communicating information over a network secretly
and reliably in the presence of a hidden adversary who can eavesdrop and inject
malicious errors. We provide polynomial-time, rate-optimal distributed network
codes for this scenario, improving on the rates achievable in previous work.
Our main contribution shows that as long as the sum of the adversary's jamming
rate Zo and his eavesdropping rate Zi is less than the network capacity C,
(i.e., Zo+Zi<C), our codes can communicate (with vanishingly small error
probability) a single bit correctly and without leaking any information to the
adversary. We then use this to design codes that allow communication at the
optimal source rate of C-Zo-Zi, while keeping the communicated message secret
from the adversary. Interior nodes are oblivious to the presence of adversaries
and perform random linear network coding; only the source and destination need
to be tweaked. In proving our results we correct an error in prior work by a
subset of the authors in this work.Comment: 6 pages, to appear at IEEE NetCod 201
List and Unique Error-Erasure Decoding of Interleaved Gabidulin Codes with Interpolation Techniques
A new interpolation-based decoding principle for interleaved Gabidulin codes
is presented. The approach consists of two steps: First, a multi-variate
linearized polynomial is constructed which interpolates the coefficients of the
received word and second, the roots of this polynomial have to be found. Due to
the specific structure of the interpolation polynomial, both steps
(interpolation and root-finding) can be accomplished by solving a linear system
of equations. This decoding principle can be applied as a list decoding
algorithm (where the list size is not necessarily bounded polynomially) as well
as an efficient probabilistic unique decoding algorithm. For the unique
decoder, we show a connection to known unique decoding approaches and give an
upper bound on the failure probability. Finally, we generalize our approach to
incorporate not only errors, but also row and column erasures.Comment: accepted for Designs, Codes and Cryptography; presented in part at
WCC 2013, Bergen, Norwa
- …