Secrecy and Robustness for Active Attack in

Secrecy and Robustness for Active Attack
in Secure Network Coding
Masahito Hayashia,b , Masaki Owaric , Go Katod and Ning Caie
a
Graduate School of Mathematics, Nagoya University
Centre for Quantum Technologies, National University of Singapore
c
Department of Computer Science, Faculty of Informatics, Shizuoka University
d
NTT Communication Science Laboratories, NTT Corporation
e
the School of Information Science and Technology, ShanghaiTech University
Email: [email protected], [email protected], [email protected] & [email protected]
arXiv:1703.00723v1 [cs.IT] 2 Mar 2017
b
Abstract—In the network coding, we discuss the effect by
sequential error injection to information leakage. We show that
there is no improvement when the network is composed of
linear operations. However, when the network contains non-linear
operations, we find a counterexample to improve Eve’s obtained
information. Further, we discuss the asymptotic rate in the linear
network under the secrecy and robustness conditions.
Index Terms—secrecy analysis, secure network coding, sequential injection, passive attack, active attack
I. I NTRODUCTION
Secure network coding offers a method securely transmitting information from the authorized sender to the authorized
receiver. Cai and Yeung [1] discussed the secrecy for the malicious adversary, Eve, wiretapping a subset EE of all channels
in the network. Using the universal hashing lemma [2], [3], [4],
the papers [5], [6] showed the existence of a secrecy code that
universally works for any types of eavesdroppers under the size
constraint of EE . Also, the paper [7] discussed construction
of such a code.
As another attack to information transmission via the network, the malicious adversary contaminates the communication by contaminating the information on a subset EA of all
channels in the network. Using the method of error correction,
the papers [8], [9], [10], [11] proposed a method to protect
the message from the contamination. The correctness of the
recovered message by the authorized receiver is called robustness. Now, for simplicity, we consider the unicast setting.
When the transmission rate from the authorized sender, Alice
to the authorized receiver, Bob is m0 and the rate of noise
injected by Eve is m1 , using the result of the papers [12],
[13] the paper [14] showed that there exists a sequence of
asymptotically correctable code with the rate m0 − m1 if the
rate of information leakage to Eve is less than m0 − m1 .
However, there is a possibility that the malicious adversary
makes a combination of eavesdropping and the contamination.
That is, contaminating a part of channels, the malicious adversary might improve the ability of eavesdropping. In this paper,
we discuss the secrecy when Eve eavesdrops the information
on the channels in EE , and adds artificial information to
the information on the channels in EA sequentially based on
the obtained information. We call such an active operation
a strategy. When EA = EE , under this assumption Eve is
allowed to arbitrarily modify the information on the channels
in EA sequentially based on the obtained information.
The aim of this paper is the following. Firstly, we show
that any strategy cannot improve Eve’s information when the
any operations in the network are linear. Then, to clarify the
necessity of the linearity assumption, we give a counterexample for the non-linear network, in which, there exists a
strategy to improve Eve’s information. This example shows
the importance of the assumption of the linearity. Also, when
the transmission rate from Alice to Bob is m0 , the rate of noise
injected by Eve is m1 , and the rate of information leakage to
Eve is m2 , we discuss a code satisfying the secrecy and the
robustness. In the asymptotic setting, we show the existence
of such a secure protocol with the rate m0 − m1 − m2 .
The remaining part of this paper is organized as follows.
Section II formulates our problem and shows the impossibility
of Eve’s eavesdropping under the linear network. Section III
gives a counterexample in the non-linear case. Section IV
discusses the asymptotic setting, and show the achievability
of the asymptotic rate m0 − m1 − m2 .
II. S ECRECY
IN FINITE - LENGTH SETTING
We consider the unicast setting. Assume that the authorized
sender, Alice, and the authorized receiver, Bob, are linked via
a network with the set of edges E, where the operations on
all nodes are linear on the finite filed Fq with prime power q.
3
and Bob receives
Alice inputs the input variable X in Fm
q
4
the output variable YB in Fm
.
We
also
assume that the
q
2
malicious adversary, Eve, wiretaps the information YE in Fm
q
on the edges of a subset EE ⊂ E. Now, we fix the topology
and dynamics (operations on the intermediate nodes) of the
network. When we assume all operations on the intermediate
m4 ×m3
3
nodes are linear on Fm
q , there exist matrices KB ∈ Fq
m2 ×m3
and KE ∈ Fq
such that the variables X, YB , and YE
satisfy their relations
YB = KB X,
YE = KE X.
(1)
That is, the matrices KB and KE are decided from the network
topology and dynamics. We call this attack the passive attack.
To address the active attack, we consider stronger Eve, i.e.,
1
we assume that Eve adds an error Z in Fm
on the edges
q
4 ×m3
of a subset EA ⊂ E. Using matrices HB ∈ Fm
and
q
m2 ×m1
, we rewrite the above relations as
HE ∈ F q
YB = KB X + HB Z,
YE = KE X + HE Z,
(2)
(3)
which is called the wiretap and addition model.
Now, to consider the time ordering among the edges in E,
we assign the numbers to all elements of E such that E =
{e(1), . . . , e(k)}. We assume that the information transmission
on each edge is done with this order. In this representation, the
elements of Z and YE are arranged in this order. Hence, the
elements of the subsets EE and EA are expressed as EE =
{e(ζ(1)), . . . , e(ζ(m2 ))} and EA = {e(η(1)), . . . , e(η(m1 ))}
by using two strictly increasing functions ζ and η. The
causality yields that
HE;j,i = 0 when η(i) ≥ ζ(j).
(4)
It is natural that Eve can choose the information to be added
in the edge e(i) ∈ EA based on the information obtained
previously on the edges in the subset {e(ζ(j)) ∈ EE |ζ(j) ≤
η(i)}. That is, the added error Z is given as a function α
of YE , which can be regarded as Eve’s strategy. We call this
attack the active attack with the strategy α.
Now, we consider the n-transmission setting, in which,
Alice uses the same network n times to send the message
to Bob. Alice’s input variable (Eve’s added variable) is given
as a matrix X n ∈ Fqm3 ×n (a matrix Z n ∈ Fqm1 ×n ), and Bob’s
(Eve’s) received variable is given as a matrix YBn ∈ Fqm4 ×n
(a matrix YEn ∈ Fqm2 ×n ). We assume that the topology and
dynamics of the network and the edge attacked by Eve are
not changed during n transmissions. Their relation is given as
YBn = KB X n + HB Z n ,
YEn = KE X n + HE Z n .
(5)
(6)
To discuss the secrecy, we formulate a code. Let M and
L be the message set and the set of values of the scramble
random number. Then, an encoder is given as a function φn
from M × L to Fqm3 ×n , and the decoder is given as ψn from
Fqm4 ×n to M. Our code is the pair (φn , ψn ), and is denoted
by Φn . Then, we denote the message and the scramble random
number by M and L. The cardinality of M is called the size
of the code and is denoted by |Φn |.
Here, we treat KB , KE , HB , HE as deterministic values,
and denote the pairs (KB , KE ) and (HB , HE ) by K and
H, respectively. In the following, we fix Φn , K, H, α. As
a measure of the leaked information, we adopt the mutual
information I(M ; YEn , Z n ) between M and Eve’s information
YEn and Z n Since the variable Z n is given as a function of
YEn , we have I(M ; YEn , Z n ) = I(M ; YEn ). Since the leaked
information is given as a function of Φn , K, H, α in this
situation, we denote it by I(M ; YEn )[Φn , K, H, α]. When we
always choose Z n = 0, the attack is the same as the passive attack. This strategy is denoted by 0. When K, H are treated as
random variables independent of M, L, the leaked information
is given as the expectation of I(M ; YEn )[Φn , K, H, α]. This
probabilistic setting expresses the situation that Eve cannot
necessarily choose her position to attack by herself while she
knows the position, and chooses her strategy dependently of
the position.
Now, we have the following theorem.
Theorem 1. For any Eve’s strategy α, Eve’s information YEn
with strategy α and that with strategy 0 can be simulated by
each other. Hence, we have the equation
I(M ; YEn )[Φn , K, H, 0] = I(M ; YEn )[Φn , K, H, α].
(7)
This theorem shows that the information leakage of the
active attack with the strategy α is the same as the information
leakage of the passive attack. Hence, to guarantee the secrecy
under an arbitrary active attack, it is sufficient to show the
secrecy under the passive attack.
n
Proof. We define two random variables YE,p
:= KE X n and
n
n
n
n
YE,a := KE X + HE Z . Eve can simulate her outcome YE,a
n
n
under the strategy α from YE,p , HE , and Z . So, we have
n
n
n
I(M ; YE,p
) ≥ I(M ; YE,a
, Z n ) = I(M ; YE,a
). Conversely,
n
n
since YE,p is given as a function of YE,a , Z n , and HE , we
have the opposite inequality.
Remark 1 (Number of choices). To compare the passive
attack with the active attack, we count the number of choices
of both attacks. In the passive attack, when we fix the rank of
KE (the dimension of leaked information), by taking account
into the equivalent class, the number of the possible choices is
upper bounded by q m2 (m3 −m2 ) . In the active attack case, this
calculation is more complicated. For simplicity, we consider
the case with n = 1. Now, we do not count the choice for the
inputs on the edge η(i) with η(i) ≥ ζ(m2 ) because it does not
effects Eve’s information. Then, even when we fix the matrices
KE , HE , the number of choices of α is
q
P
i:η(i)<ζ(m2 )
q Ti
(8)
,
where Ti := max{j|η(i) ≥ ζ(j)}. Notice that Ti = i when
EA = EE . If we count
the choice on the remaining edges, we
P
Ti
i:η(i)≥ζ(m2 ) q
on (8). For general n, the
need to multiply q
number of choices of α is
qn
P
i:η(i)<ζ(m2 )
qnTi
.
(9)
Remark 2 (Wiretap and Replacement). The above analysis
discusses the case when Eve adds the error Z. However, Eve
might replace the information on the edges in EA by another
elements U , which is called the wiretap and replacement
model. This situation has different network structure. By using
′
′
′
′
matrices KB
, KE
, HB
and HE
different from KB , KE , HB
and HE , the observations YB and YE are given as
′
′
YB = KB
X + HB
U,
′
′
YE = KE X + HE U.
(10)
(11)
However, when the set EA is the same as the set EE , it is
allowed to employ the original model (2) and (3) because any
strategy with the model (10) and (11) can be written as a
strategy with the original model (2) and (3).
Remark 3. Theorem 1 discusses the unicast case. It can be
trivially extended to the multicast case because we do not
discuss the decoder. It also can be extended to the multiple
unicast case, in which, there are several pairs of sender
and receiver. When there are k pairs in this setting, the
random variables M and L have the forms (M1 , . . . , Mk ) and
(L1 , . . . , Lk ). So, we can apply the discussion of Theorem 1.
III. N ON - LINEAR COUNTER EXAMPLE
To clarify the impossibility of Theorem 1 under the nonlinear network, we show a counter example composed of nonlinear operations. We consider the network given in Fig. 1,
whose edges are E = {e(1), e(2), e(3), e(4)}. Each edge e(i)
is assumed to send the binary information Yi . The intermediate
node makes the non-linear operation as
Y3 := Y1 (Y2 + Y1 ),
Y4 := (Y1 + 1)(Y2 + Y1 ).
e(1)
e(3)
e(2)
e(4)
(12)
(13)
Alice
Bob
To send the binary information M ∈ F2 , we prepare the
binary uniform scramble random variable L ∈ F2 . We consider
the following code. The encoder φ is given as
Y2 := M + L.
(14)
The decoder ψ is given as ψ(Y3 , Y4 ) := Y3 + Y4 .
Since Y3 and Y4 are given as follows under this code;
Y3 := LM,
Y4 := LM + M,
(15)
the decoder can recover M nevertheless the value of L.
Now, we consider the leaked information for the passive
attack. Eve is allowed to attack two edges of E except for the
pairs {e(1), e(2)} and {e(3), e(4)}. The mutual information
of these cases are calculated to
Y1 := M + L,
Y2 := L.
(18)
Replacing M + L by L, the analysis can be reduced to the
presented analysis. Other encoders clearly leaks the message
M to e(1) or e(2).
In this model, Eve can perfectly contaminates the message
M . When Eve take the choice (i), and replace Y3 by Y3 + 1,
Bob’s decoded message is M + 1. Under the choice (ii), Eve
can perfectly contaminates the message M in a similar way.
Next, under the same assumption as Section II, we consider
the asymptotic setting by taking account into robustness as
well as secrecy. We have assumed that the topology and
dynamics of network and the edge attacked by Eve are not
changed during n transmission. Now, we assume that Eve
knows these matrices and Alice and Bob know none of them
because Alice and Bob often do not know the topology and
dynamics of the network the edge attacked by Eve.
When Eve adds the error Z n , there is a possibility that
Bob cannot recover the original information M . This problem
is called the robustness, and may be regarded as a kind
of error correction. Under the conventional error correction,
the error Z n is treated as a random variable subject to the
uniform distribution. However, our problem is different from
the conventional error correction. Since the decoding error
probability depends of the strategy α. So, we denote it by
Pe [Φn , K, H, α]. In the following, we assume that
rank KB = m0
I(M ; Y1 , Y3 ) = I(M ; Y1 , Y4 )
=I(M ; Y2 , Y3 ) = I(M ; Y2 , Y4 ) =
Remark 4. Our analysis covers the optimal codes. As another
encoder, we can consider
IV. A SYMPTOTIC SETTING
Fig. 1. Non-linear network.
Y1 := L,
When EA = EE = {e(1), e(3)}, Eve replaces Y1 by
1. Then, I(M ; Y1 , Y3 ) = 1 because Y3 +Y1 +1 = M .
(ii)
When EA = EE = {e(1), e(4)}, Eve replaces Y1 by
0. Then, I(M ; Y1 , Y3 ) = 1 because Y4 + Y1 = M .
(iii) When EA = EE = {e(2), e(3)} or {e(2), e(4)}, Eve
has no good active attack.
To see the difference from the linear case, we adopt a weak
secrecy criterion in this section. When YE is Eve’s information
and I(M ; YE ) < 1 for all of Eve’s possible attack, we say that
the code is secure. Otherwise, it is called insecure.
When Eve is allowed to use the above passive attack, (16)
shows that the code is secure. When Eve is allowed to use the
above active attack, the above calculation shows that the code
is insecure. Therefore, this example is a counter example of
Theorem 1.
(i)
1
,
2
d1 (M |Y1 , Y3 ) = d1 (M |Y1 , Y4 )
(16)
1
.
(17)
2
In this section, we choose the base of the logarithm to be 2.
Now, we consider the active attack with EA = EE of the
above four cases.
=d1 (M |Y2 , Y3 ) = d1 (M |Y2 , Y4 ) =
(19)
as well as (4). Since any algebraic operation on the finite field
Fq can be regarded as an algebraic operation on t-dimensional
algebraic extension Fq′ of the finite field Fq , where q ′ = q t .
So, the matrices KB , HB , KE , HE on Fq can be regarded as
matrices on Fq′ . By choosing n to be tn′ , the matrices X n ,
n′
n′
n′
YBn , YEn , Z n on Fq is converted to matrices X ′ , YB′ , YE′ ,
n′
Z ′ on Fq′ , which also satisfy (5) and (6) by regarding the
same matrices KB , HB , KE , HE on Fq as matrices on Fq′ .
Proposition 1 ([14], [12], [13]). Assume that m2 + m1 <
m0 . When the size q ′ of the finite field increases such ′that
m
m +1
log n
⌉.),
n′ 0 = o(q ′ ), (e.g., q ′ = n′ 0 , i.e., t = ⌈ (m0 +1)
log q
there exists a sequence of codes Φn′ ′of block-length n′ on
k
finite field Fq′ whose message set is Fq′n′ such that
for any x ∈ X and y ∈ Y.
For s ∈ (0, 1], we define the conditional Rényi entropy
H1+s (X|Z) for the joint distribution PXZ as [4]
X
X
−1
log
PZ (z)
PX|Z (x|z)1+s , (28)
H1+s (X|Z) :=
s
k′ ′
lim n′ = m0 − m1
n→∞ n
lim max max Pe [Φn , K, H, α] = 0
↑
which is often denoted by H1+s
(X|Z) in [16], [17]. When X
obeys the uniform distribution, we have
n→∞ K,H
α
(20)
(21)
where the maximum is taken with respect to
2 ×m3
(KB , HB , KE , HE ) ∈ Fqm4 ×m3 × Fqm4 ×m1 × Fm
×
q
m2 ×m1
with (4) and (19).
Fq
The optimality of the rate m0 − m1 was also shown in [18],
[19]. Proposition 1 requires the finite field Fq with infinitely
large. The paper [15, Appendix D] discussed the construction
of F2t whose multiplication and inverse multiplication have
calculation complexity O(t log t)1 .
log n′
⌉ and ln′ := tn′ n′ ,
By choosing tn′ = ⌈ (m0 +1)
log q
Proposition 1 can be rewritten as follows.
Corollary 1. Assume that m2 + m1 < m0 . There exists a
sequence of codes Φln of block-length ln on finite field Fq
whose message set is Fkq n such that
lim
kn
n→∞ ln
= m0 − m1
(22)
lim max max Pe [Φn , K, H, α] = 0,
n→∞ K,H
α
(23)
where the maximum is taken in the same way as Proposition
1.
Combining Theorem 1 and Corollary 1, we obtain the
following theorem.
Theorem 2. Assume that m2 + m1 < m0 . There exists a
sequence of codes Φn of block-length ln on finite field Fq
whose message set is Fkq n such that
lim
kn
= m0 − m1 − m2
(24)
lim max max Pe [Φn , K, H, α] = 0
(25)
lim max max I(M ; YEn )[Φn , K, H, α] = 0,
(26)
n→∞ ln
n→∞ K,H
n→∞ K,H
α
α
where the maximum is taken in the same way as Proposition
1.
Before our proof, we prepare basic facts of informationtheoretic security. We focus on a random hash function fR
from X to Y with random variable R deciding the function
fR . It is called universal2 when
Pr{fR (x) = y} ≤
1 The
|Y|
|X |
(27)
multiplication of elements v and z of F2t is essentially given in
(124) of [15] by using the Fourier transform via the calculation on circulant
matrices. For the inverse multiplication of an element v of F2t , we calculate
F −1 [−F v.∗F z] instead of F −1 [F v.∗F z] in (124), where F is the discrete
Fourier transform.
z∈Z
x∈X
H1+s (X|Z) ≥ log
|X |
.
|Z|
(29)
Proposition 2. [2], [3][4, Theorem 1]
I(fR (X); Z|R) ≤
es log |Y|−H1+s (X|Z)
s
(30)
for s ∈ (0, 1].
Proof. We choose a sequence of codes {Φn =√(φn , ψn )}
given in Corollary 1. We fix k̄n := kn − m2 ln − ⌈ ln ⌉. Now,
we choose a universal2 linear random hash function fR from
Fkq n to Fk̄q n .
To make our code, we consider a virtual protocol as follows.
First, Alice sends her larger message M by using the code
Φn , and Bob recovers it. Second, Alice randomly chooses R
deciding the hash function fR and sends it to Bob via public
channel. Finally, Alice and Bob apply the hash function fR to
their message, and denote the result value by M̄ so that Alice
and Bob share the information M̄ with probability almost
close to 1.
Since the conditional mutual information between
M̄ and YEln depends on Φn , K, H, α, we denote
it by I(M̄ ; YEln |R)[Φn , K, H, α]. Theorem 1 shows
I(M̄ ; YEln |R)[Φn , K, H, α] = I(M̄ ; YEln |R)[Φn , K, H, 0],
which does not depend on KB , HB , HE and depends only
on KE . Now, we evaluate this leaked information via a
similar idea to the paper [5]. Since Inequality (29) implies
that H1+s (M |YEln ) ≥ (kn − ln m2 ) log q, Proposition 2 yields
that
ln
es(k̄n log q−H1+s (M|YE
s
I(M̄ ; YEln |R)[Φn , K, H, 0] ≤
√
))
q −s⌈ ln ⌉
q s(k̄n −kn +ln m2 )
≤
.
(31)
≤
s
s
We set s = 1. Since the number of matrices KE satisfying
rank KE = m1 is bounded by q m2 (m3 −m2 ) , Markov inequality guarantees that the inequality
√
I(M̄ ; YEln )[K, H, 0]|R=r ≤ q −⌈
ln ⌉+m2 (m3 −m2 )+1
(32)
holds for any matrix KE satisfying for any matrix KE ∈
2 ×m3
at least with probability 1− 1q . Therefore, there exists
Fm
q
a suitable hash function fr such that
√
I(M̄ ; YEln )[Φn , K, H, 0]|R=r ≤ q −⌈
ln ⌉+m2 (m3 −m2 )+1
,
which goes to zero as n goes to infinity because m2 (m3 −
m2 ) + 1 is a constant.
Now, we back to the construction of real √codes. We choose
m l +⌈ ln ⌉
, respectively.
the sets M and L to be Fk̄q n and Fq 2 n
Since the linearity and
the
surjectivity
of
f
r implies that
√
|fr−1 (x)| = q m2 ln +⌈ ln ⌉ for any element x ∈ M, we can
define the invertible function f¯r from M × L to the domain
of fr , i.e., Fkq n such that f¯r−1 (fr−1 (x)) = {x} × L for any
element x ∈ M. This condition implies fr ◦ f¯r (x, y) = x for
(x, y) ∈ M×L. Then, we define our encoder as φ̄n := φn ◦ f¯r ,
and the decoder as φ̄n := fr ◦ φn . The sequence of codes
{(φ̄n , ψ̄n )} satisfies the desired requirements.
Remark 5 (Efficient code construction). We discuss an efficient construction of our code from a code (φn , ψn ) given
in Corollary 1 with q = 2. A modified form of the Toeplitz
matrices is also shown to be universal2 , √
which is given by a
concatenation (T (S), I) of the (m2 ln + ⌈ ln ⌉) × k̄n Toeplitz
matrix T (S) and the k̄n × k̄n identity matrix I [15], where S is
the random seed to decide the Toeplitz matrix and belongs to
F2kn −1 . The (modified) Toeplitz matrices are particularly useful
in practice, because there exists an efficient multiplication
algorithm using the fast Fourier transform algorithm with
complexity O(ln log ln ).
When the random seed S is fixed, the encoder for
our code is given as follows. By √using the scramm l +⌈ ln ⌉)
, the encoder
ble random variable L ∈ F2 2 n
I −T (S) M because
φ̄n is given as φn
0
I
L
I −T (S)
(I, T (S))
= (I, 0). (The multiplication of
0
I
Toeplitz matrix T (S) can be performed as a part of circulant
matrix. For example, the reference [15, Appedix C] gives a
method to give a circulant matrix.). More efficient construction
for univeral2 hash function is discussed in [15]. So, the
decoder ψ̄n is given as YBln 7→ (I, T (S))ψn (YBln ).
Remark 6. If we do not apply Theorem 1 in (32), we have to
multiply the number of the choices of the strategy α. As the
generalization of (8), this number is given in (9), which glows
up double-exponentially. Hence, our proof of Theorem 2 does
not work without use of Theorem 1.
V. C ONCLUSION
We have discussed the effect by sequential error injection
to Eve’s obtained information. As the result, we have shown
that there is no improvement when the network is composed
of linear operations. However, when the network contains
non-linear operations, we have found a counterexample to
improve Eve’s obtained information. Further, we have shown
the achievability of the asymptotic rate m0 − m1 − m2 for
a linear network under the secrecy and robustness conditions
when the transmission rate from Alice to Bob is m0 , the rate
of noise injected by Eve is m1 , and the rate of information
leakage to Eve is m2 . The converse part of this rate is an
interesting open problem.
ACKNOWLEDGMENTS
The works reported here were supported in part by the JSPS
Grant-in-Aid for Scientific Research (C) No. 16K00014 and
(B) No. 16KT0017, the Okawa Research Grant and Kayamori
Foundation of Informational Science Advancement.
R EFERENCES
[1] N. C. N. Cai and R. Yeung, “Secure network coding,” Proc. 2002 IEEE
Int. Symp. Information Theory (ISIT 2002), Lausanne, Swiss, July 2002,
p. 323.
[2] C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized
privacy amplification,” IEEE Trans. Inform. Theory, vol. 41, no. 6, pp.
1915–1923, (1995).
[3] J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, “A Pseudorandom
Generator from any One-way Function,” SIAM J. Comput. 28, 1364
(1999).
[4] M. Hayashi, “Exponential decreasing rate of leaked information in
universal random privacy amplification,” IEEE Trans. Inform. Theory,
vol. 57, no. 6, pp. 3989–4001, (2011).
[5] R. Matsumoto and M. Hayashi, “Secure Multiplex Network Coding,”
2011 International Symposium on Networking Coding (2011): DOI:
10.1109/ISNETCOD.2011.5979076.
[6] R. Matsumoto and M. Hayashi, “Universal Strongly Secure Network
Coding with Dependent and Non-Uniform Messages,” Arxiv preprint,
arXiv:1111.4174 (2011).
[7] J. Kurihara, R. Matsumoto, and T. Uyematsu, “Relative generalized rank
weight of linear codes and its applications to network coding,” IEEE
Trans. Inform. Theory, vol. 61, no. 7, pp. 3912–3936 (2013).
[8] R. W. Yeung and N. Cai, “Network error correction, part 1: Basic concepts and upper bounds,” Submitted to Communications in Information
and Systems (2006).
[9] N. Cai and R. W. Yeung, “Network error correction, Part 2: Lower
bounds,” Commun. Inf. and Syst., vol. 6, no. 1, pp. 37-54, (2006).
[10] T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros, and D. R.
Karger, “Byzantine modification detection for multicast networks using
randomized network coding,” Proc. 2004 IEEE Int. Symp. Information
Theory (ISIT 2004), Chicago, IL, June/July 2004, p. 144.
[11] S. Jaggi, M. Langberg, T. Ho, and M. Effros, “Correction of adversarial
errors in networks,” Proc. 2005 IEEE Int. Symp. Information Theory
(ISIT 2005), Adelaide, Australia, Sept. 2005, pp. 1455-1459.
[12] S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Médard,
“Resilient network coding in the presence of byzantine adversaries,” in
Proc. IEEE INFOCOM 2007, Anchorage, AK, May 2007.
[13] S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Medard, and
M. Effros, “Resilient Network Coding in the Presence of Byzantine
Adversaries,” IEEE Transactions on Information Theory, vol. 54, no. 6,
pp. 2596–2603, (2008).
[14] S. Jaggi and M. Langberg, “Resilient network coding in the presence
of eavesdropping byzantine adversaries,” Proc. 2007 IEEE Int. Symp.
Information Theory (ISIT 2007), Nice, France, June 2007, p. 541 – 545.
[15] M. Hayashi and T. Tsurumaru, “More Efficient Privacy Amplification
with Less Random Seeds via Dual Universal Hash Function,” IEEE
Transactions on Information Theory, vol. 62, no. 4, pp. 2213 – 2232,
(2016).
[16] M. Tomamichel, M. Berta, and M. Hayashi, “Relating different quantum
generalizations of the conditional Renyi entropy,” J. Math. Phys., vol.
55, no. 8, p. 082206, 2014.
[17] M. Hayashi and S. Watanabe. (2013). “Non-asymptotic and asymptotic
analyses of information processing on Markov chains,” Arxiv preprint,
arXiv:1309.7528, 2013.
[18] N. Cai and T. Chan, “Theory of Secure Network Coding,” Proceedings
of the IEEE, vol. 99, no. 3, pp 421-437 (2011).
[19] N. Cai and R. W. Yeung, “Secure Network Coding on a Wiretap
Network,” IEEE Transactions on Information Theory, vol. 57, no. 1,
pp. 424-435, (2011).