Abstract
We obtain a relationship between the rate and security for secure multi-cast linear network codes in the presence of a 'wire-tap' adversary who can eavesdrop on a bounded number of network edges. Specifically, we show that a network code that can communicate information at rate R and is secure against an adversary eavesdropping on z network edges can be transformed to a code that allows communication at rate R-1 while being secure against a more potent adversary eavesdropping on z+1 network edges. Results of this nature are known under the assumption that only the network source node has the ability to generate random keys used to obfuscate the communicated messages. The novelty of this work lies in studying the setting in which each network node may generate independent random keys.
Original language | English |
---|---|
Title of host publication | 2018 IEEE International Symposium on Information Theory, ISIT 2018 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 846-850 |
Number of pages | 5 |
ISBN (Print) | 9781538647806 |
DOIs | |
State | Published - 15 Aug 2018 |
Externally published | Yes |
Event | 2018 IEEE International Symposium on Information Theory, ISIT 2018 - Vail, United States Duration: 17 Jun 2018 → 22 Jun 2018 |
Publication series
Name | IEEE International Symposium on Information Theory - Proceedings |
---|---|
Volume | 2018-June |
ISSN (Print) | 2157-8095 |
Conference
Conference | 2018 IEEE International Symposium on Information Theory, ISIT 2018 |
---|---|
Country/Territory | United States |
City | Vail |
Period | 17/06/18 → 22/06/18 |
Bibliographical note
Publisher Copyright:© 2018 IEEE.