Next Article in Journal
Electric Double Layer and Orientational Ordering of Water Dipoles in Narrow Channels within a Modified Langevin Poisson-Boltzmann Model
Next Article in Special Issue
Computational Hardness of Collective Coin-Tossing Protocols
Previous Article in Journal
Metaheuristics in the Optimization of Cryptographic Boolean Functions
Previous Article in Special Issue
Bounds on the Sum-Rate of MIMO Causal Source Coding Systems with Memory under Spatio-Temporal Distortion Constraints
Open AccessFeature PaperArticle

Reduction Theorem for Secrecy over Linear Network Code for Active Attacks

by 1,2,3,4,*,‡, 5, 6 and 7,‡
1
Shenzhen Institute for Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
2
Guangdong Provincial Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
3
Shenzhen Key Laboratory of Quantum Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
4
Graduate School of Mathematics, Nagoya University, Nagoya 464-8602, Japan
5
Department of Computer Science, Faculty of Informatics, Shizuoka University, Shizuoka 422-8529, Japan
6
NTT Communication Science Laboratories, NTT Corporation, Tokyo 100-8116, Japan
7
The School of Information Science and Technology, ShanghaiTech University, Middle Huaxia Road no. 393, Pudong, Shanghai 201210, China
*
Author to whom correspondence should be addressed.
Parts of this paper were presented at the 2017 IEEE International Symposium on Information Theory (ISIT 2017), Aachen, Germany, 25–30 June 2017.
These authors contributed equally to this work.
Entropy 2020, 22(9), 1053; https://doi.org/10.3390/e22091053
Received: 27 August 2020 / Revised: 16 September 2020 / Accepted: 16 September 2020 / Published: 21 September 2020
(This article belongs to the Special Issue Multiuser Information Theory III)
We discuss the effect of sequential error injection on information leakage under a network code. We formulate a network code for the single transmission setting and the multiple transmission setting. Under this formulation, we show that the eavesdropper cannot increase the power of eavesdropping by sequential error injection when the operations in the network are linear operations. We demonstrated the usefulness of this reduction theorem by applying a concrete example of network. View Full-Text
Keywords: secrecy analysis; secure network coding; sequential injection; passive attack; active attack secrecy analysis; secure network coding; sequential injection; passive attack; active attack
Show Figures

Figure 1

MDPI and ACS Style

Hayashi, M.; Owari, M.; Kato, G.; Cai, N. Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. Entropy 2020, 22, 1053. https://doi.org/10.3390/e22091053

AMA Style

Hayashi M, Owari M, Kato G, Cai N. Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. Entropy. 2020; 22(9):1053. https://doi.org/10.3390/e22091053

Chicago/Turabian Style

Hayashi, Masahito; Owari, Masaki; Kato, Go; Cai, Ning. 2020. "Reduction Theorem for Secrecy over Linear Network Code for Active Attacks" Entropy 22, no. 9: 1053. https://doi.org/10.3390/e22091053

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop