SECURE NETWORK CODING
Ning Cai
ShanghaiTech University Email: cai@gmx.de Beyond I.I.D. in Information Theory IMS, NUS, Singapore July 25, 2017
Ning Cai Beyond I.I.D. in Information Theory 1 / 37
Communication network A (directed) Graph G = ( V , E ) : nodes-users, - - PowerPoint PPT Presentation
S ECURE N ETWORK C ODING Ning Cai ShanghaiTech University Email: cai@gmx.de Beyond I.I.D. in Information Theory IMS, NUS, Singapore July 25, 2017 Ning Cai Beyond I.I.D. in Information Theory 1 / 37 C ONTENTS Basic Model 1 Extensions and
ShanghaiTech University Email: cai@gmx.de Beyond I.I.D. in Information Theory IMS, NUS, Singapore July 25, 2017
Ning Cai Beyond I.I.D. in Information Theory 1 / 37
1
2
3
Ning Cai Beyond I.I.D. in Information Theory 2 / 37
1
2
3
Ning Cai Beyond I.I.D. in Information Theory 3 / 37
Ning Cai Beyond I.I.D. in Information Theory 4 / 37
Ning Cai Beyond I.I.D. in Information Theory 5 / 37
′ be the outputs of the random-
′, u ∈ U, ψu(m ′, k ′) for all k, k ′, where ψu is is the
Ning Cai Beyond I.I.D. in Information Theory 6 / 37
Ning Cai Beyond I.I.D. in Information Theory 7 / 37
Ning Cai Beyond I.I.D. in Information Theory 8 / 37
Ning Cai Beyond I.I.D. in Information Theory 9 / 37
1
A
1
v . . . .
2
v
2
A
1
A
m
A
1
A
t
2
A
t
m
A
t s A1 A2 Am
2
A
m
A
Ning Cai Beyond I.I.D. in Information Theory 10 / 37
Ning Cai Beyond I.I.D. in Information Theory 11 / 37
S
4 3 2 1 5 n
T
Ning Cai Beyond I.I.D. in Information Theory 12 / 37
Ning Cai Beyond I.I.D. in Information Theory 13 / 37
1
2
3
Ning Cai Beyond I.I.D. in Information Theory 14 / 37
Ning Cai Beyond I.I.D. in Information Theory 15 / 37
Ning Cai Beyond I.I.D. in Information Theory 16 / 37
Ning Cai Beyond I.I.D. in Information Theory 17 / 37
Ning Cai Beyond I.I.D. in Information Theory 18 / 37
1
2
3
Ning Cai Beyond I.I.D. in Information Theory 19 / 37
Ning Cai Beyond I.I.D. in Information Theory 20 / 37
Ning Cai Beyond I.I.D. in Information Theory 21 / 37
Alice Bob e(2) e(1) e(3) e(4)
Ning Cai Beyond I.I.D. in Information Theory 22 / 37
Ning Cai Beyond I.I.D. in Information Theory 23 / 37
1
Ning Cai Beyond I.I.D. in Information Theory 24 / 37
Ning Cai Beyond I.I.D. in Information Theory 25 / 37
Ning Cai Beyond I.I.D. in Information Theory 26 / 37
Bobs Alice
e(1,1) e(1,2) e(1,3) e(1,k1 ) e(2,1) e(2,2) e(2,2) e(2,k2 ) e(3,1) e(3,1) e(3,1) e(3,k2 )
Ning Cai Beyond I.I.D. in Information Theory 27 / 37
Ning Cai Beyond I.I.D. in Information Theory 28 / 37
i := kiγi; and for a = i +
i := min{kaγa, ka−1−ra−1 ka−1
i
ka−ra ka ha
1≤a≤l
1.
1≤a≤l
1
ha
1
ka , a = 1, 2, . . . , l
Ning Cai Beyond I.I.D. in Information Theory 29 / 37
ri
Ning Cai Beyond I.I.D. in Information Theory 30 / 37
1
1.
Ning Cai Beyond I.I.D. in Information Theory 31 / 37
ka−ra ka ha 1 and γi := ha
1
ka , a = 1, 2, . . . , l be inte-
1−h unites of randomness and sends
1 unites) via the first group
k1 h1 1 −h unites of randomness
k1 h1 unites) in secrete from Eve, and other
Ning Cai Beyond I.I.D. in Information Theory 32 / 37
hi
1 hi
1−h unites of “secure randomness” and
1 − ki−ri hi
1 hi
1 unites of “insecure randomness” from the
1
ki−ri ki hi 1 ≤ κi+1 unites of randomness and send it with
hi+1
1
1
1 − h (secure and insecure) randomness, who dis-
Ning Cai Beyond I.I.D. in Information Theory 33 / 37
j=i+1 kj−rj kj (ki − ri)γi.
hi
1
ki is an integer for every i, there is
l
Ning Cai Beyond I.I.D. in Information Theory 34 / 37
Ning Cai Beyond I.I.D. in Information Theory 35 / 37
Ning Cai Beyond I.I.D. in Information Theory 36 / 37
Ning Cai Beyond I.I.D. in Information Theory 37 / 37