70,079 research outputs found
Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages
We consider the random linear precoder at the source node as a secure network
coding. We prove that it is strongly secure in the sense of Harada and Yamamoto
and universal secure in the sense of Silva and Kschischang, while allowing
arbitrary small but nonzero mutual information to the eavesdropper. Our
security proof allows statistically dependent and non-uniform multiple secret
messages, while all previous constructions of weakly or strongly secure network
coding assumed independent and uniform messages, which are difficult to be
ensured in practice.Comment: 10 pages, 1 figure, IEEEtrans.cls. Online published in IEEE Trans.
Inform. Theor
On the Security of Index Coding with Side Information
Security aspects of the Index Coding with Side Information (ICSI) problem are
investigated. Building on the results of Bar-Yossef et al. (2006), the
properties of linear index codes are further explored. The notion of weak
security, considered by Bhattad and Narayanan (2005) in the context of network
coding, is generalized to block security. It is shown that the linear index
code based on a matrix , whose column space code has length ,
minimum distance and dual distance , is -block secure
(and hence also weakly secure) if the adversary knows in advance
messages, and is completely insecure if the adversary knows in advance more
than messages. Strong security is examined under the conditions that
the adversary: (i) possesses messages in advance; (ii) eavesdrops at most
transmissions; (iii) corrupts at most transmissions. We prove
that for sufficiently large , an optimal linear index code which is strongly
secure against such an adversary has length . Here
is a generalization of the min-rank over of the side
information graph for the ICSI problem in its original formulation in the work
of Bar- Yossef et al.Comment: 14 page
New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding
The universal secure network coding presented by Silva et al. realizes secure
and reliable transmission of a secret message over any underlying network code,
by using maximum rank distance codes. Inspired by their result, this paper
considers the secure network coding based on arbitrary linear codes, and
investigates its security performance and error correction capability that are
guaranteed independently of the underlying network code. The security
performance and error correction capability are said to be universal when they
are independent of underlying network codes. This paper introduces new code
parameters, the relative dimension/intersection profile (RDIP) and the relative
generalized rank weight (RGRW) of linear codes. We reveal that the universal
security performance and universal error correction capability of secure
network coding are expressed in terms of the RDIP and RGRW of linear codes. The
security and error correction of existing schemes are also analyzed as
applications of the RDIP and RGRW.Comment: IEEEtran.cls, 8 pages, no figure. To appear in Proc. 50th Annual
Allerton Conference on Communication, Control, and Computing (Allerton 2012).
Version 2 added an exact expression of the universal error correction
capability in terms of the relative generalized rank weigh
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
By extending the notion of minimum rank distance, this paper introduces two
new relative code parameters of a linear code C_1 of length n over a field
extension and its subcode C_2. One is called the relative
dimension/intersection profile (RDIP), and the other is called the relative
generalized rank weight (RGRW). We clarify their basic properties and the
relation between the RGRW and the minimum rank distance. As applications of the
RDIP and the RGRW, the security performance and the error correction capability
of secure network coding, guaranteed independently of the underlying network
code, are analyzed and clarified. We propose a construction of secure network
coding scheme, and analyze its security performance and error correction
capability as an example of applications of the RDIP and the RGRW. Silva and
Kschischang showed the existence of a secure network coding in which no part of
the secret message is revealed to the adversary even if any dim C_1-1 links are
wiretapped, which is guaranteed over any underlying network code. However, the
explicit construction of such a scheme remained an open problem. Our new
construction is just one instance of secure network coding that solves this
open problem.Comment: IEEEtran.cls, 25 pages, no figure, accepted for publication in IEEE
Transactions on Information Theor
Perfectly Secure Index Coding
In this paper, we investigate the index coding problem in the presence of an
eavesdropper. Messages are to be sent from one transmitter to a number of
legitimate receivers who have side information about the messages, and share a
set of secret keys with the transmitter. We assume perfect secrecy, meaning
that the eavesdropper should not be able to retrieve any information about the
message set. We study the minimum key lengths for zero-error and perfectly
secure index coding problem. On one hand, this problem is a generalization of
the index coding problem (and thus a difficult one). On the other hand, it is a
generalization of the Shannon's cipher system. We show that a generalization of
Shannon's one-time pad strategy is optimal up to a multiplicative constant,
meaning that it obtains the entire boundary of the cone formed by looking at
the secure rate region from the origin. Finally, we consider relaxation of the
perfect secrecy and zero-error constraints to weak secrecy and asymptotically
vanishing probability of error, and provide a secure version of the result,
obtained by Langberg and Effros, on the equivalence of zero-error and
-error regions in the conventional index coding problem.Comment: 25 pages, 5 figures, submitted to the IEEE Transactions on
Information Theor
Message Randomization and Strong Security in Quantum Stabilizer-Based Secret Sharing for Classical Secrets
We improve the flexibility in designing access structures of quantum
stabilizer-based secret sharing schemes for classical secrets, by introducing
message randomization in their encoding procedures. We generalize the
Gilbert-Varshamov bound for deterministic encoding to randomized encoding of
classical secrets. We also provide an explicit example of a ramp secret sharing
scheme with which multiple symbols in its classical secret are revealed to an
intermediate set, and justify the necessity of incorporating strong security
criterion of conventional secret sharing. Finally, we propose an explicit
construction of strongly secure ramp secret sharing scheme by quantum
stabilizers, which can support twice as large classical secrets as the
McEliece-Sarwate strongly secure ramp secret sharing scheme of the same share
size and the access structure.Comment: Publisher's Open Access PDF. arXiv admin note: text overlap with
arXiv:1811.0521
- …