Back to Search Start Over

Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys

Authors :
Chaudhuri, Debaditya
Langberg, Michael
Effros, Michelle
Publication Year :
2019

Abstract

It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to $z$ network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate is well understood. Computing the secure multicast rate, or even the secure unicast rate, in the more general setting in which all network nodes may generate (independent) random keys is known to be as difficult as computing the (non-secure) capacity of multiple-unicast network coding instances --- a well known open problem. This work treats an intermediate model of secure unicast in which only one node can generate random keys, however that node need not be the source node. The secure communication rate for this setting is characterized again with an eavesdropper that has access to $z$ network links.

Details

Database :
arXiv
Publication Type :
Report
Accession number :
edsarx.1907.03522
Document Type :
Working Paper