Algorithms for weakly secure data exchange

NetCod(2013)

引用 35|浏览21
暂无评分
摘要
We consider the problem of direct data exchange among a group of wireless clients in the presence of an eavesdropper. An instance of this problem includes a set of packets X and a set of clients, such that each client has an access to a subset of packets and requests the rest of the packets in X. The clients use a lossless broadcast channel to transmit packets to other clients in the group. All transmitted packets can be observed by an eavesdropper that might have prior side information about the packets exchanged by the clients. Our goal is to construct a coding scheme that prevents the eavesdropper from decoding any individual packet in X (beyond those it already knowns). In weakly secure schemes, the more packets the eavesdropper has, the harder it is to construct a scheme that prevents the eavesdropper from obtaining additional packets. Thus, it is natural to measure the degree of secrecy by the maximum number of packets that can be held by the eavesdropper. Accordingly, our goal is to construct a coding scheme that can handle an eavesdropper that has as many packets as possible. We also present randomized and deterministic solutions for this problem and analyze their performance. We also establish a tight upper bound on the maximum degree of secrecy that a weakly secure scheme can provide for each instance of the problem.
更多
查看译文
关键词
broadcast channels,data communication,randomized solutions,transmitted packets,eavesdropper,coding scheme,wireless clients,encoding,lossless broadcast channel,weakly secure data exchange,telecommunication security,deterministic solutions,vectors,polynomials,security,wireless communication
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要