Characterizing positive-rate secure multicast network coding with eavesdropping nodes

Michael Langberg, Michelle Effros

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Motivated by the study of multi-source multiterminal key-dissemination, here called "key-cast;"the work at hand presents a combinatorial characterization of when positiverate secure multicast network coding in the presence of eaves-dropping nodes is possible. In key-cast, introduced by the authors in [ITW2022], network nodes hold independent random bits, and one seeks a communication scheme that allows all terminal nodes to share a secret key K. We here address positive (albeit, arbitrarily small) rate key-cast under the security requirement that no single non-terminal network node can gain information about the shared key K; this scenario is useful in cryptographic settings. The work at hand studies key-dissemination protocols based on secure network coding and presents a combinatorial characterization of networks that support positive-rate multicast resilient to eavesdroppers that control individual network nodes. The secure-multicast capacity solution in the same setting is a known open problem.

Original languageEnglish
Title of host publication2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1303-1308
Number of pages6
ISBN (Electronic)9798350382846
DOIs
StatePublished - 7 Jul 2024
Externally publishedYes
Event2024 IEEE International Symposium on Information Theory, ISIT 2024 - Athens, Greece
Duration: 7 Jul 202412 Jul 2024

Publication series

Name2024 IEEE International Symposium on Information Theory (ISIT)

Conference

Conference2024 IEEE International Symposium on Information Theory, ISIT 2024
Country/TerritoryGreece
CityAthens
Period7/07/2412/07/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Fingerprint

Dive into the research topics of 'Characterizing positive-rate secure multicast network coding with eavesdropping nodes'. Together they form a unique fingerprint.

Cite this