Secure Network Coding in the Setting in Which a Non-Source Node May Generate Random Keys [article]

Debaditya Chaudhuri, Michael Langberg, Michelle Effros
2019 arXiv   pre-print
It is common in the study of secure multicast network coding in the presence of an eavesdropper that has access to z network links, to assume that the source node is the only node that generates random keys. In this setting, the secure multicast rate is well understood. Computing the secure multicast rate, or even the secure unicast rate, in the more general setting in which all network nodes may generate (independent) random keys is known to be as difficult as computing the (non-secure)
more » ... y of multiple-unicast network coding instances — a well known open problem. This work treats an intermediate model of secure unicast in which only one node can generate random keys, however that node need not be the source node. The secure communication rate for this setting is characterized again with an eavesdropper that has access to z network links.
arXiv:1907.03522v1 fatcat:vutvsu77fnhv7cwruermuav6qm