Abstract
This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations is characterized and it is shown to be a function of only the min-cut capacities and the number of edges the eavesdropper wiretaps. A polynomial-time two-phase scheme is then designed for a general number of destinations and its achievable secure rate region is derived. It is shown that the secure capacity result for the two destinations case is not reversible, that is, by switching the role of the source and destinations and by reversing the directions of the edges, the secure capacity region changes.
Original language | English (US) |
---|---|
Title of host publication | Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings |
Editors | Junji Shikata |
Publisher | Springer Verlag |
Pages | 188-207 |
Number of pages | 20 |
ISBN (Print) | 9783319720883 |
DOIs | |
State | Published - 2017 |
Event | 10th International Conference on Information Theoretic Security, ICITS 2017 - Hong Kong, Hong Kong Duration: Nov 29 2017 → Dec 2 2017 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 10681 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Other
Other | 10th International Conference on Information Theoretic Security, ICITS 2017 |
---|---|
Country/Territory | Hong Kong |
City | Hong Kong |
Period | 11/29/17 → 12/2/17 |
Bibliographical note
Publisher Copyright:© Springer International Publishing AG. 2017.