Secure Network Coding on a Wiretap Network

被引:154
作者
Cai, Ning [1 ]
Yeung, Raymond W. [1 ,2 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
[2] Chinese Univ Hong Kong, Inst Network Coding, Shatin, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Algebraic coding; cryptography; multicast; network coding; secret sharing; wiretap channel; ERROR-CORRECTION;
D O I
10.1109/TIT.2010.2090197
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the network can be utilized. In this paper, we propose a model, call the wiretap network, that incorporates information security with network coding. In this model, a collection of subsets of the channels in the network is given, and a wiretapper is allowed to access any one (but not more than one) of these subsets without being able to obtain any information about the message transmitted. Our model includes secret sharing in classical cryptography as a special case. We present a construction of secure linear network codes that can be used provided a certain graph-theoretic condition is satisfied. We also prove the necessity of this condition for the special case that the wiretapper may choose to access any subset of channels of a fixed size. The optimality of our code construction is established for this special case. Finally, we extend our results to the scenario when the wiretapper is allowed to obtain a controlled amount of information about the message.
引用
收藏
页码:424 / 435
页数:12
相关论文
共 31 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], 2005, Foundation and Trends in Communications and Information Theory
[3]  
[Anonymous], 1991, ELEMENTS INFORM THEO, DOI [DOI 10.1002/0471200611, 10.1002/0471200611]
[4]  
[Anonymous], 2005, NETCOD
[5]  
[Anonymous], 2002, A first course in information theory
[6]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[7]  
CAI N, 2007, IEEE INT S INF THEOR
[8]  
Cai N., 2009, IEEE INT S INF THEOR
[9]  
CAI N, 2002, IEEE INT S INF THEOR
[10]  
Cai N, 2006, COMMUN INF SYST, V6, P37