On the Security of Index Coding With Side Information

Security aspects of the index coding with side information (ICSI) problem are investigated. Building on the results of Bar-Yossef (2006), the properties of linear index codes are further explored. The notion of weak security, considered by Bhattad and Narayanan (2005) in the context of network coding, is generalized to block security. It is shown that the linear index code based on a matrix <i>L</i>, whose column space code <i>C</i>(<i>L</i>) has length <i>n</i>, minimum distance <i>d</i> , and dual distance <i>d</i><sup>⊥</sup> , is (<i>d</i>-1-<i>t</i>) -block secure (and hence also weakly secure) if the adversary knows in advance <i>t</i> ≤ <i>d</i>-2 messages, and is completely insecure if the adversary knows in advance more than <i>n</i> - <i>d</i><sup>⊥</sup> messages. Strong security is examined under the conditions that the adversary: 1) possesses <i>t</i> messages in advance; 2) eavesdrops at most μ transmissions; 3) corrupts at most δ transmissions. We prove that for sufficiently large <i>q</i> , an optimal linear index code which is strongly secure against such an adversary has length κ<sub>q</sub>+μ+2δ . Here, κ<sub>q</sub> is a generalization of the min-rank over F<sub>q</sub> of the side information graph for the ICSI problem in its original formulation in the work of Bar-Yossef et al.

[1]  Alexander Sprintson,et al.  On the relation between the Index Coding and the Network Coding problems , 2008, 2008 IEEE International Symposium on Information Theory.

[2]  Lih-Yuan Deng,et al.  Orthogonal Arrays: Theory and Applications , 1999, Technometrics.

[3]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[4]  Emina Soljanin,et al.  On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.

[5]  Frank R. Kschischang,et al.  Universal secure error-correcting schemes for network coding , 2010, 2010 IEEE International Symposium on Information Theory.

[6]  Uri Stav,et al.  Non-Linear Index Coding Outperforming the Linear Optimum , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[7]  James L. Massey,et al.  Minimal Codewords and Secret Sharing , 1999 .

[8]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[9]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[10]  Uri Stav,et al.  Non-Linear Index Coding Outperforming the Linear Optimum , 2007, FOCS.

[11]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[12]  Yitzhak Birk,et al.  Informed-source coding-on-demand (ISCOD) over broadcast channels , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[13]  Femke Bekius,et al.  The Shannon Capacity of a Graph , 2011 .

[14]  Yuan Zhou Introduction to Coding Theory , 2010 .

[15]  Yuan Luo,et al.  Secure Error-Correcting Network Codes with Side Information from Source , 2010, 2010 International Conference on Communications and Intelligence Information Security.

[16]  Yeow Meng Chee,et al.  Index coding and error correction , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[17]  Yitzhak Birk,et al.  Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients , 2006, IEEE Transactions on Information Theory.

[18]  Frank R. Kschischang,et al.  Universal weakly secure network coding , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[19]  Yunnan Wu,et al.  The Local Mixing Problem , 2006 .

[20]  Muriel Médard,et al.  Symbol-level network coding for wireless mesh networks , 2008, SIGCOMM '08.

[21]  René Peeters,et al.  Orthogonal representations over finite fields and the chromatic number of graphs , 1996, Comb..

[22]  Ziv Bar-Yossef,et al.  Index Coding With Side Information , 2006, IEEE Transactions on Information Theory.

[23]  Alexander Sprintson,et al.  On the Minimum Number of Transmissions in Single-Hop Wireless Coding Networks , 2007, 2007 IEEE Information Theory Workshop.

[24]  Alexander Vardy,et al.  The intractability of computing the minimum distance of a code , 1997, IEEE Trans. Inf. Theory.

[25]  Ron M. Roth,et al.  Introduction to Coding Theory , 2019, Discrete Mathematics.

[26]  O. Antoine,et al.  Theory of Error-correcting Codes , 2022 .

[27]  Muriel Médard,et al.  An algebraic approach to network coding , 2003, TNET.

[28]  Emmanuel Abbe Coding Theory , 2020 .

[29]  Kousha Etessami,et al.  On the Complexity of Nash Equilibria and Other Fixed Points (Extended Abstract) , 2010, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[30]  Cunsheng Ding,et al.  Linear Multisecret-Sharing Schemes and Error-Correcting Codes , 1997, J. Univers. Comput. Sci..

[31]  M.A.R. Chaudhry,et al.  Efficient algorithms for Index Coding , 2008, IEEE INFOCOM Workshops 2008.

[32]  Muriel Médard,et al.  XORs in the Air: Practical Wireless Network Coding , 2006, IEEE/ACM Transactions on Networking.

[33]  Jon Feldman,et al.  On the Capacity of Secure Network Coding , 2004 .

[34]  Alexander Sprintson,et al.  On the Index Coding Problem and Its Relation to Network Coding and Matroid Theory , 2008, IEEE Transactions on Information Theory.

[35]  Noga Alon,et al.  Broadcasting with Side Information , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[36]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.