Loading...
Please wait, while we are loading the content...
Similar Documents
Using Feedback for Secrecy over Graphs
| Content Provider | arXiv |
|---|---|
| Author | Mishra, Shaunak Fragouli, Christina Prabhakaran, Vinod Diggavi, Suhas |
| Date of Submission | 2013-05-27 |
| Abstract | We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs. |
| Related Links | https://arxiv.org/pdf/1305.3051.pdf |
| Page Count | 6 |
| arXiv | 1305.3051 |
| Language | English |
| Access Restriction | Open |
| Subject Keyword | Computer Science - Information Theory Computer Science - Cryptography and Security Computer Science Mathematics |
| Content Type | Text |
| Resource Type | Article |
| Subject | Mathematics |