Secure network coding in the presence of eavesdroppers

  • Ming Xing Luo*
  • , Yi Xian Yang
  • , Li Cheng Wang
  • , Xin Xin Niu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network coding in the generalized combination network can be characterized by the network capacity and the min-cut bound of wiretapping set from the source. Furthermore, it can be extended to any directed acyclic networks with single source. Compared with the traditional results, we construct information-theoretic secure network coding without additional encryptions and giving up any capacity.

Original languageEnglish
Pages (from-to)648-658
Number of pages11
JournalScience in China, Series F: Information Sciences
Volume53
Issue number3
DOIs
Publication statusPublished - 2010
Externally publishedYes

Keywords

  • All-or-nothing transformation
  • Eavesdropping
  • Secure network coding

Fingerprint

Dive into the research topics of 'Secure network coding in the presence of eavesdroppers'. Together they form a unique fingerprint.

Cite this