Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes

被引:14
作者
Cai, Ning [1 ]
Hayashi, Masahito [2 ,3 ,4 ,5 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
[2] Nagoya Univ, Grad Sch Math, Nagoya, Aichi 4648602, Japan
[3] Southern Univ Sci & Technol, Shenzhen Inst Quantum Sci & Engn, Shenzhen 518055, Peoples R China
[4] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117542, Singapore
[5] Peng Cheng Lab, Ctr Quantum Comp, Shenzhen 518000, Peoples R China
基金
日本学术振兴会;
关键词
Adaptive systems; Adaptation models; Linearity; Network coding; Linear codes; Biological system modeling; Contamination; Secrecy analysis; secure network coding; adaptive attack; active attack; ERROR-CORRECTION; INFORMATION; NONUNIFORM; CHANNELS;
D O I
10.1109/TIT.2019.2957078
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In secure network coding, there is a possibility that the eavesdropper can improve her performance when she changes (contaminates) the information on the attacked edges (active attack) and chooses the attacked edges adaptively (adaptive attack). We analyze the security for network code over such types of attacks. We show that active and adaptive attacks cannot improve the performance of the eavesdropper when the code is linear. Further, we give a non-linear example, in which an adaptive attack improves the performance of the eavesdropper. We derive the capacity for the unicast case and the capacity region for the multicast case or the multiple multicast case in several examples of relay networks, beyond the minimum cut theorem, when no additional random number is allowed as scramble variables in the intermediate nodes. No prior study compared the difference of the capacity and the capacity region between the existence and the non-existence of randomness in the intermediate nodes under these network models even with non-adaptive and non-active attacks.
引用
收藏
页码:1428 / 1448
页数:21
相关论文
共 46 条
[1]   Secure Network Coding for Multiple Unicast: On the Case of Single Source [J].
Agarwal, Gaurav Kumar ;
Cardone, Martina ;
Fragouli, Christina .
INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 :188-207
[2]  
Agarwal GK, 2016, IEEE INT SYMP INFO, P2134, DOI 10.1109/ISIT.2016.7541676
[3]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], 2016, P IEEE GLOB WORKSH G
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]  
Baranyai Zs., 1973, C MATH SOC JANOS BOL, P91
[9]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[10]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323