617 research outputs found
On secure network coding with uniform wiretap sets
This paper shows determining the secrecy capacity of a unicast network with
uniform wiretap sets is at least as difficult as the k-unicast problem. In
particular, we show that a general k-unicast problem can be reduced to the
problem of finding the secrecy capacity of a corresponding single unicast
network with uniform link capacities and one arbitrary wiretap link
On Secure Network Coding with Nonuniform or Restricted Wiretap Sets
The secrecy capacity of a network, for a given collection of permissible
wiretap sets, is the maximum rate of communication such that observing links in
any permissible wiretap set reveals no information about the message. This
paper considers secure network coding with nonuniform or restricted wiretap
sets, for example, networks with unequal link capacities where a wiretapper can
wiretap any subset of links, or networks where only a subset of links can
be wiretapped. Existing results show that for the case of uniform wiretap sets
(networks with equal capacity links/packets where any can be wiretapped),
the secrecy capacity is given by the cut-set bound, and can be achieved by
injecting random keys at the source which are decoded at the sink along
with the message. This is the case whether or not the communicating users have
information about the choice of wiretap set. In contrast, we show that for the
nonuniform case, the cut-set bound is not achievable in general when the
wiretap set is unknown, whereas it is achievable when the wiretap set is made
known. We give achievable strategies where random keys are canceled at
intermediate non-sink nodes, or injected at intermediate non-source nodes.
Finally, we show that determining the secrecy capacity is a NP-hard problem.Comment: 24 pages, revision submitted to IEEE Transactions on Information
Theor
Coding Schemes for Achieving Strong Secrecy at Negligible Cost
We study the problem of achieving strong secrecy over wiretap channels at
negligible cost, in the sense of maintaining the overall communication rate of
the same channel without secrecy constraints. Specifically, we propose and
analyze two source-channel coding architectures, in which secrecy is achieved
by multiplexing public and confidential messages. In both cases, our main
contribution is to show that secrecy can be achieved without compromising
communication rate and by requiring only randomness of asymptotically vanishing
rate. Our first source-channel coding architecture relies on a modified wiretap
channel code, in which randomization is performed using the output of a source
code. In contrast, our second architecture relies on a standard wiretap code
combined with a modified source code termed uniform compression code, in which
a small shared secret seed is used to enhance the uniformity of the source code
output. We carry out a detailed analysis of uniform compression codes and
characterize the optimal size of the shared seed.Comment: 15 pages, two-column, 5 figures, accepted to IEEE Transactions on
Information Theor
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages
We consider the random linear precoder at the source node as a secure network
coding. We prove that it is strongly secure in the sense of Harada and Yamamoto
and universal secure in the sense of Silva and Kschischang, while allowing
arbitrary small but nonzero mutual information to the eavesdropper. Our
security proof allows statistically dependent and non-uniform multiple secret
messages, while all previous constructions of weakly or strongly secure network
coding assumed independent and uniform messages, which are difficult to be
ensured in practice.Comment: 10 pages, 1 figure, IEEEtrans.cls. Online published in IEEE Trans.
Inform. Theor
- …