Afficher la notice abrégée

hal.structure.identifierCentrum Wiskunde & Informatica [CWI]
hal.structure.identifierMathematisch Instituut Universiteit Leiden
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorSPINI, Gabriele
hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
dc.contributor.authorZÉMOR, Gilles
dc.date.accessioned2024-04-04T03:12:20Z
dc.date.available2024-04-04T03:12:20Z
dc.date.created2016-08-11
dc.date.issued2016-08-11
dc.date.conference2016-07-10
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/193861
dc.description.abstractEnIn the model of Secure Network Coding, a sender is connected to several receivers by a network, i.e. a directed graph with a single source node and several destination nodes, where each node can perform operations on the values received via the incoming edges and sends the results via the outbound edges. An active adversary controls some of the edges; this means that he can read every symbol transmitted over the edges under his control and replace them with symbols of his choice. The goal of Secure Network Coding is to design protocols that allow transmission of a secret message from the sender to all receivers in a private and reliable way. Classically, only one-way communication (from sender to receivers) has been studied; in this setting, security can be guaranteed as long as the number of edges controlled by the adversary is less than one third of the network connectivity. In this paper, we present a procedure where receivers are allowed to send feedback to the sender; with this feature, security is guaranteed against a stronger adversary: namely, the number of corrupted edges only needs to be smaller than one half of the connectivity. Furthermore, like previous state-of-the-art work on the single-round scenario, our scheme is universal, i.e. it does not require knowledge of the network code.
dc.language.isoen
dc.publisherIEEE
dc.subject.enNetwork Coding
dc.title.enUniversally Secure Network Coding with Feedback
dc.typeCommunication dans un congrès
dc.subject.halMathématiques [math]/Théorie de l'information et codage [math.IT]
dc.subject.halInformatique [cs]/Théorie de l'information [cs.IT]
bordeaux.page2339--2343
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleIEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15 2016
bordeaux.countryES
bordeaux.conference.cityBarcelona
bordeaux.peerReviewedoui
hal.identifierhal-01413344
hal.version1
hal.invitednon
hal.proceedingsnon
hal.conference.organizerIEEE - Institute of Electrical and Electronics Engineers
hal.conference.end2016-07-15
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-01413344v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.date=2016-08-11&rft.spage=2339--2343&rft.epage=2339--2343&rft.au=SPINI,%20Gabriele&Z%C3%89MOR,%20Gilles&rft.genre=unknown


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée