Title :
Performance Bounds in Secure Network Coding
Author :
Cheng, Fan ; Yeung, Raymond W.
Author_Institution :
Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Hong Kong, China
Abstract :
Consider a communication network represented by a directed graph G = (V, ε), where V is the set of nodes and ε is the set of point-to-point channels in the network. On the network a secure message M is transmitted, and there may exist wiretappers who want to obtain information about the message. In secure network coding, we aim to find a network code which can protect the message against the wiretapper whose power is constrained. Cai and Yeung [3] studied the model in which the wiretapper can access any one but not more than one set of channels, called a wiretap set, out of a collection A of all possible wiretap sets. In order to protect the message, the message needs to be mixed with a random key K. They proved tight fundamental performance bounds when A consists of all subsets of 8 of a fixed size r. In this paper, we investigate the problem when A consists of arbitrary subsets off and obtain the following results: 1) an upper bound on H(M); 2) a lower bound on H(K) in terms of H(M). The upper bound on H(M) is explicit, while the lower bound on H(K) can be computed in polynomial time. The tightness of the lower bound for the point-to-point communication system is also proved.
Keywords :
cryptography; network coding; telecommunication networks; telecommunication security; communication network; directed graph; information-theoretic cryptography; performance bounds; point-to-point channels; point-to-point communication system; polynomial time; secure network coding; Bismuth; Cryptography; Encoding; Network coding; Receivers; Upper bound;
Conference_Titel :
Network Coding (NetCod), 2011 International Symposium on
Conference_Location :
Beijing
Print_ISBN :
978-1-61284-138-0
DOI :
10.1109/ISNETCOD.2011.5978913