Reliable and Secure Multishot Network Coding Using Linearized Reed-Solomon Codes

被引:55
作者
Martinez-Penas, Umberto [1 ]
Kschischang, Frank R. [1 ]
机构
[1] Univ Toronto, Edward S Rogers Sr Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
关键词
Linearized Reed-Solomon codes; multishot network coding; network error-correction; sum-rank metric; sum-subspace codes; wire-tap channel; ERROR-CORRECTION; CONVOLUTIONAL-CODES; RANK; SKEW; BOUNDS;
D O I
10.1109/TIT.2019.2912165
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to t links, erase up to rho packets, and wire-tap up to mu links, all throughout l shots of a linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may be random and change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of ln' - 2t - rho - mu packets for coherent communication, where n' is the number of outgoing links at the source, for any packet length m >= n' (largest possible range). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. The required field size is q(m), where q > l, thus q(m) approximate to l(n'), which is always smaller than that of a Gabidulin code tailored for l shots, which would be at least 2(ln)'. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length n = ln', and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication. Combined with the obtained field size, the given decoding complexity is of O(n('4)l(2)log(l)(2)) operations in F-2, whereas the most efficient known decoding algorithm for a Gabidulin code has a complexity of O(n('3.69) l(3.69) log(l)(2)) operations in F-2, assuming a multiplication in a finite field F costs about log(|F|)(2) operations in F-2.
引用
收藏
页码:4785 / 4803
页数:19
相关论文
共 59 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]   Linear codes using skew polynomials with automorphisms and derivations [J].
Boucher, D. ;
Ulmer, F. .
DESIGNS CODES AND CRYPTOGRAPHY, 2014, 70 (03) :405-431
[3]  
Boucher D., 2019, WORKSH COD CRYPT
[4]  
Cai N, 2002, PROCEEDINGS OF 2002 IEEE INFORMATION THEORY WORKSHOP, P119, DOI 10.1109/ITW.2002.1115432
[5]   Secure network coding [J].
Cai, N ;
Yeung, RW .
ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, :323-323
[6]  
Cai N, 2006, COMMUN INF SYST, V6, P37
[7]   Secure Network Coding on a Wiretap Network [J].
Cai, Ning ;
Yeung, Raymond W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) :424-435
[8]   SUBFIELD SUBCODES OF MODIFIED REED-SOLOMON CODES [J].
DELSARTE, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1975, 21 (05) :575-576
[9]   Secure Network Coding for Wiretap Networks of Type II [J].
El Rouayheb, Salim ;
Soljanin, Emina ;
Sprintson, Alex .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (03) :1361-1371
[10]  
Feldman Jon., 2004, 42 ANN ALLERTON C CO, P63