Secure Network Coding for Multiple Unicast: On the Case of Single Source

Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations is characterized and it is shown to be a function of only the min-cut capacities and the number of edges the eavesdropper wiretaps. A polynomial-time two-phase scheme is then designed for a general number of destinations and its achievable secure rate region is derived. It is shown that the secure capacity result for the two destinations case is not reversible, that is, by switching the role of the source and destinations and by reversing the directions of the edges, the secure capacity region changes.

Original languageEnglish (US)
Title of host publicationInformation Theoretic Security - 10th International Conference, ICITS 2017, Proceedings
EditorsJunji Shikata
PublisherSpringer Verlag
Pages188-207
Number of pages20
ISBN (Print)9783319720883
DOIs
StatePublished - 2017
Event10th International Conference on Information Theoretic Security, ICITS 2017 - Hong Kong, Hong Kong
Duration: Nov 29 2017Dec 2 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10681 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other10th International Conference on Information Theoretic Security, ICITS 2017
Country/TerritoryHong Kong
CityHong Kong
Period11/29/1712/2/17

Bibliographical note

Publisher Copyright:
© Springer International Publishing AG. 2017.

Fingerprint

Dive into the research topics of 'Secure Network Coding for Multiple Unicast: On the Case of Single Source'. Together they form a unique fingerprint.

Cite this