Skip to main content
Erschienen in:
Buchtitelbild

2014 | OriginalPaper | Buchkapitel

How to Construct Strongly Secure Network Coding Scheme

verfasst von : Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta

Erschienen in: Information Theoretic Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We say that a network coding scheme is strongly \(1\)-secure if a source node \(s\) can multicast \(n\) field elements \(\{m_1, \cdots , m_n\}\) to a set of sink nodes \(\{t_1, \cdots , t_q\}\) in such a way that any single edge leaks no information on any \(S \subset \{m_1, \cdots , m_n\}\) with \(|S|=n-1\), where \(n=\min _{t_i}\)max-flow\((s,t_i)\) is the maximum transmission capacity. We also say that a strongly \(h\)-secure network coding scheme is strongly \((h+1)\)-secure if any \(h+1\) edges leak no information on any \(S \subset \{m_1, \cdots , m_n\}\) with \(|S|=n-(h+1)\).
In this paper, we show the first explicit algorithm which can construct strongly \(k\)-secure network coding schemes. In particular, it runs in polynomial time for fixed \(k\).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
See “Time Complexity” of [14, page 313].
 
2
Our strongly \((n-1)\)-secure is their strongly \(0\)-secure [5].
 
3
They instead analyzed a case such that the source node multicasts \(n'<n\) field elements [5, Sec. 6].
 
4
In the scheme of Kurihara et al. [7], \(T \ge n'+n\) if the source nodes multicasts \(n'\) messages. So \(T \ge 2n\) if the source nodes multicasts \(n\) messages.
 
5
Tang et al. [14] did not show such an algorithm.
 
6
Since the first row of \(U^*\) consists of nonzero elements, it holds that \(rank(U^*_{A, \{1\}})=1\) for any \(A \in \mathsf{Rank}_{2}\). Therefore there exists a \(\{1\}\)-zero projection of \(U^*\) from Lemma 3.
 
7
Since the 2nd row of \(U^*\) consists of nonzero elements, it holds that \(rank(U^*_{A, \{2\}})=1\) for any \(A \in \mathsf{Rank}_{2}\). Therefore there exists a \(\{2\}\)-zero projection of \(U^*\) from Lemma 3.
 
Literatur
1.
2.
Zurück zum Zitat Bhattad, K., Narayanan, K.R.: Weakly secure network coding. In: Proceedings of NetCod 2005, April 2005 Bhattad, K., Narayanan, K.R.: Weakly secure network coding. In: Proceedings of NetCod 2005, April 2005
3.
Zurück zum Zitat Cai, N., Yeung, R.W.: A security condition for multi-source linear network coding. In: Proceedings of the IEEE ISIT, pp. 561–565, 24–29 June 2007 Cai, N., Yeung, R.W.: A security condition for multi-source linear network coding. In: Proceedings of the IEEE ISIT, pp. 561–565, 24–29 June 2007
4.
Zurück zum Zitat Cai, N., Yeung, R.W.: Secure network coding on a wiretap network. IEEE Trans. Inf. Theory 57(1), 424–435 (2011)CrossRefMathSciNet Cai, N., Yeung, R.W.: Secure network coding on a wiretap network. IEEE Trans. Inf. Theory 57(1), 424–435 (2011)CrossRefMathSciNet
5.
Zurück zum Zitat Harada, K., Yamamoto, H.: Strongly secure linear network coding. IEICE Trans. 91–A(10), 2720–2728 (2008)CrossRef Harada, K., Yamamoto, H.: Strongly secure linear network coding. IEICE Trans. 91–A(10), 2720–2728 (2008)CrossRef
6.
Zurück zum Zitat Jaggi, S., Sanders, P., Chou, P.A., Effros, M., Egner, S., Jain, K., Tolhuizen, L.M.G.M.: Polynomial time algorithms for multicast network code construction. IEEE Trans. Inf. Theory 51(6), 1973–1982 (2005)CrossRefMathSciNet Jaggi, S., Sanders, P., Chou, P.A., Effros, M., Egner, S., Jain, K., Tolhuizen, L.M.G.M.: Polynomial time algorithms for multicast network code construction. IEEE Trans. Inf. Theory 51(6), 1973–1982 (2005)CrossRefMathSciNet
7.
Zurück zum Zitat Kurihara, J., Uematsu, T., Matsumoto, R.: Explicit construction of universal strongly secure network coding via MRD codes. In: Proceedings of the IEEE ISIT 2012, Cambridge, MA, USA, pp. 1488–1492, July 2012 Kurihara, J., Uematsu, T., Matsumoto, R.: Explicit construction of universal strongly secure network coding via MRD codes. In: Proceedings of the IEEE ISIT 2012, Cambridge, MA, USA, pp. 1488–1492, July 2012
9.
Zurück zum Zitat Nishiara, M., Takizawa, K.: Strongly secure secret sharing scheme with ramp threshold based on Shamir’s polynomial interpolation scheme. IEICE Trans. Fundam. (Jpn. Ed.) J92–A(12), 1009–1013 (2009) Nishiara, M., Takizawa, K.: Strongly secure secret sharing scheme with ramp threshold based on Shamir’s polynomial interpolation scheme. IEICE Trans. Fundam. (Jpn. Ed.) J92–A(12), 1009–1013 (2009)
10.
Zurück zum Zitat Silva, D., Kschischang, F.R.: Security for wiretap networks via rankmetric codes. In: Proceedings of the IEEE International Symposium Information Theory, Toronto, Canada, pp. 176–180, 6–11 July 2008 Silva, D., Kschischang, F.R.: Security for wiretap networks via rankmetric codes. In: Proceedings of the IEEE International Symposium Information Theory, Toronto, Canada, pp. 176–180, 6–11 July 2008
11.
Zurück zum Zitat Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: Proceedings of IEEE ITW 2009, pp. 281–285, June 2009 Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: Proceedings of IEEE ITW 2009, pp. 281–285, June 2009
12.
Zurück zum Zitat Silva, D., Kschischang, F.R.: Universal secure network coding via rank-metric codes. IEEE Trans. Inf. Theory 57(2), 1124–1135 (2011)CrossRefMathSciNet Silva, D., Kschischang, F.R.: Universal secure network coding via rank-metric codes. IEEE Trans. Inf. Theory 57(2), 1124–1135 (2011)CrossRefMathSciNet
13.
Zurück zum Zitat Shioji, E., Matsumoto, R., Uyematsu, T.: Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers. IEICE Trans. 93–A(11), 2026–2033 (2010)CrossRef Shioji, E., Matsumoto, R., Uyematsu, T.: Vulnerability of MRD-code-based universal secure network coding against stronger eavesdroppers. IEICE Trans. 93–A(11), 2026–2033 (2010)CrossRef
14.
Zurück zum Zitat Tang, Z., Lim, H.W., Wang, H.: Revisiting a secret sharing approach to network codes. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 300–317. Springer, Heidelberg (2012) Tang, Z., Lim, H.W., Wang, H.: Revisiting a secret sharing approach to network codes. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol. 7496, pp. 300–317. Springer, Heidelberg (2012)
Metadaten
Titel
How to Construct Strongly Secure Network Coding Scheme
verfasst von
Kaoru Kurosawa
Hiroyuki Ohta
Kenji Kakuta
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-04268-8_1