• Computer Science, Mathematics
  • Published in ArXiv 2012

On Capacity Region of Wiretap Networks

@article{Jalali2012OnCR,
  title={On Capacity Region of Wiretap Networks},
  author={Shirin Jalali and Tracey Ho},
  journal={ArXiv},
  year={2012},
  volume={abs/1212.3859}
}
In this paper we consider the problem of secure network coding where an adversary has access to an unknown subset of links chosen from a known collection of links subsets. We study the capacity region of such networks, commonly called "wiretap networks", subject to weak and strong secrecy constraints, and consider both zero-error and asymptotically zero-error communication. We prove that in general discrete memoryless networks modeled by discrete memoryless channels, the capacity region subject… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-5 OF 5 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 26 REFERENCES

Information Theory and Network Coding

R. W. Yeung
  • Springer, New York
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

From weak to strong information-theoretic key agreement

  • 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)
  • 2000
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Kim.Network information theory

Y. A. El Gamal
  • 2012
VIEW 1 EXCERPT

Network Coding Capacity Regions via Entropy Functions

  • IEEE Transactions on Information Theory
  • 2012
VIEW 2 EXCERPTS

Network equivalence in the presence of an eavesdropper

  • 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
  • 2012
VIEW 3 EXCERPTS

Secure Network Coding on a Wiretap Network

  • IEEE Transactions on Information Theory
  • 2011
VIEW 1 EXCERPT