Universally Secure Network Coding with Feedback
hal.structure.identifier | Centrum Wiskunde & Informatica [CWI] | |
hal.structure.identifier | Mathematisch Instituut Universiteit Leiden | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | SPINI, Gabriele | |
hal.structure.identifier | Institut de Mathématiques de Bordeaux [IMB] | |
dc.contributor.author | ZÉMOR, Gilles | |
dc.date.accessioned | 2024-04-04T03:12:20Z | |
dc.date.available | 2024-04-04T03:12:20Z | |
dc.date.created | 2016-08-11 | |
dc.date.issued | 2016-08-11 | |
dc.date.conference | 2016-07-10 | |
dc.identifier.uri | https://oskar-bordeaux.fr/handle/20.500.12278/193861 | |
dc.description.abstractEn | In the model of Secure Network Coding, a sender is connected to several receivers by a network, i.e. a directed graph with a single source node and several destination nodes, where each node can perform operations on the values received via the incoming edges and sends the results via the outbound edges. An active adversary controls some of the edges; this means that he can read every symbol transmitted over the edges under his control and replace them with symbols of his choice. The goal of Secure Network Coding is to design protocols that allow transmission of a secret message from the sender to all receivers in a private and reliable way. Classically, only one-way communication (from sender to receivers) has been studied; in this setting, security can be guaranteed as long as the number of edges controlled by the adversary is less than one third of the network connectivity. In this paper, we present a procedure where receivers are allowed to send feedback to the sender; with this feature, security is guaranteed against a stronger adversary: namely, the number of corrupted edges only needs to be smaller than one half of the connectivity. Furthermore, like previous state-of-the-art work on the single-round scenario, our scheme is universal, i.e. it does not require knowledge of the network code. | |
dc.language.iso | en | |
dc.publisher | IEEE | |
dc.subject.en | Network Coding | |
dc.title.en | Universally Secure Network Coding with Feedback | |
dc.type | Communication dans un congrès | |
dc.subject.hal | Mathématiques [math]/Théorie de l'information et codage [math.IT] | |
dc.subject.hal | Informatique [cs]/Théorie de l'information [cs.IT] | |
bordeaux.page | 2339--2343 | |
bordeaux.hal.laboratories | Institut de Mathématiques de Bordeaux (IMB) - UMR 5251 | * |
bordeaux.institution | Université de Bordeaux | |
bordeaux.institution | Bordeaux INP | |
bordeaux.institution | CNRS | |
bordeaux.conference.title | IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15 2016 | |
bordeaux.country | ES | |
bordeaux.conference.city | Barcelona | |
bordeaux.peerReviewed | oui | |
hal.identifier | hal-01413344 | |
hal.version | 1 | |
hal.invited | non | |
hal.proceedings | non | |
hal.conference.organizer | IEEE - Institute of Electrical and Electronics Engineers | |
hal.conference.end | 2016-07-15 | |
hal.popular | non | |
hal.audience | Internationale | |
hal.origin.link | https://hal.archives-ouvertes.fr//hal-01413344v1 | |
bordeaux.COinS | ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2016-08-11&rft.spage=2339--2343&rft.epage=2339--2343&rft.au=SPINI,%20Gabriele&Z%C3%89MOR,%20Gilles&rft.genre=unknown |
Fichier(s) constituant ce document
Fichiers | Taille | Format | Vue |
---|---|---|---|
Il n'y a pas de fichiers associés à ce document. |