Performance Bounds on a Wiretap Network With Arbitrary Wiretap Sets

Consider a communication network represented by a directed graph G = (V, ε), where V is the set of nodes and 8 is the set of point-to-point channels in the network. On the network, a secure message M is transmitted, and there may exist wiretappers who want to obtain information about the message. In secure network coding, we aim to find a network code, which can protect the message against the wiretapper whose power is constrained. Cai and Yeung studied the model in which the wiretapper can access any one but not more than one set of channels, called a wiretap set, out of a collection A of all possible wiretap sets. In order to protect the message, the message needs to be mixed with a random key K. They proved tight fundamental performance bounds when A consists of all subsets of ε of a fixed size r. However, beyond this special case, obtaining such bounds is much more difficult. In this paper, we investigate the problem when A consists of arbitrary subsets of ε and obtain the following results: 1) an upper bound on H(M) and 2) a lower bound on H(K) in terms of H(M). The upper bound on H(M) is explicit, while the lower bound on H(K) can be computed in polynomial time when |A| is fixed. The tightness of the lower bound for the point-to-point communication system is also proved.

[1]  Raymond W. Yeung,et al.  Information Theory and Network Coding , 2008 .

[2]  Ning Cai,et al.  A Security Condition for Multi-Source Linear Network Coding , 2007, 2007 IEEE International Symposium on Information Theory.

[3]  Richard M. Wilson,et al.  A course in combinatorics , 1992 .

[4]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[6]  Raymond W. Yeung,et al.  Secure error-correcting (SEC) network codes , 2009, 2009 Workshop on Network Coding, Theory, and Applications.

[7]  Raymond W. Yeung,et al.  Symmetrical multilevel diversity coding , 1997, IEEE Trans. Inf. Theory.

[8]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[9]  Emina Soljanin,et al.  On Wiretap Networks II , 2007, 2007 IEEE International Symposium on Information Theory.

[10]  R. Curtis A course in combinatorics (2nd edn), by J. H. van Lint and R. M. Wilson. Pp. 602. £24.95. 2001. ISBN 0 521 00601 5 (Cambridge University Press). , 2003, The Mathematical Gazette.

[11]  Kunihiko Harada,et al.  Strongly Secure Linear Network Coding , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[13]  Shenghao Yang,et al.  Deterministic Secure Error-Correcting (SEC) Network Codes , 2007, 2007 IEEE Information Theory Workshop.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Te Sun Han Nonnegative Entropy Measures of Multivariate Symmetric Correlations , 1978, Inf. Control..

[16]  Frank R. Kschischang,et al.  Security for wiretap networks via rank-metric codes , 2007, 2008 IEEE International Symposium on Information Theory.

[17]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[18]  Ning Cai,et al.  Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.

[19]  Jianlong Tan,et al.  Secure Network Coding with a Cost Criterion , 2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.

[20]  Tie Liu,et al.  Symmetrical multilevel diversity coding with an all-access encoder , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[21]  Muriel Médard,et al.  Secure network coding for multi-resolution wireless video streaming , 2010, IEEE Journal on Selected Areas in Communications.

[22]  John N. Tsitsiklis,et al.  Introduction to linear optimization , 1997, Athena scientific optimization and computation series.

[23]  Jon Feldman,et al.  On the Capacity of Secure Network Coding , 2004 .

[24]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[25]  Muriel Médard,et al.  Random Linear Network Coding: A free cipher? , 2007, 2007 IEEE International Symposium on Information Theory.

[26]  Tracey Ho,et al.  Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[27]  Tracey Ho,et al.  On Secure Network Coding With Nonuniform or Restricted Wiretap Sets , 2009, IEEE Transactions on Information Theory.

[28]  Mokshay M. Madiman,et al.  Information Inequalities for Joint Distributions, With Interpretations and Applications , 2008, IEEE Transactions on Information Theory.

[29]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..