TY - GEN
T1 - Secure Network Coding for Multiple Unicast
T2 - 10th International Conference on Information Theoretic Security, ICITS 2017
AU - Agarwal, Gaurav Kumar
AU - Cardone, Martina
AU - Fragouli, Christina
PY - 2017/1/1
Y1 - 2017/1/1
N2 - This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations is characterized and it is shown to be a function of only the min-cut capacities and the number of edges the eavesdropper wiretaps. A polynomial-time two-phase scheme is then designed for a general number of destinations and its achievable secure rate region is derived. It is shown that the secure capacity result for the two destinations case is not reversible, that is, by switching the role of the source and destinations and by reversing the directions of the edges, the secure capacity region changes.
AB - This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations is characterized and it is shown to be a function of only the min-cut capacities and the number of edges the eavesdropper wiretaps. A polynomial-time two-phase scheme is then designed for a general number of destinations and its achievable secure rate region is derived. It is shown that the secure capacity result for the two destinations case is not reversible, that is, by switching the role of the source and destinations and by reversing the directions of the edges, the secure capacity region changes.
UR - http://www.scopus.com/inward/record.url?scp=85036620163&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85036620163&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-72089-0_11
DO - 10.1007/978-3-319-72089-0_11
M3 - Conference contribution
AN - SCOPUS:85036620163
SN - 9783319720883
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 188
EP - 207
BT - Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings
A2 - Shikata, Junji
PB - Springer Verlag
Y2 - 29 November 2017 through 2 December 2017
ER -