Using feedback for secrecy over graphs. Mishra, S., Fragouli, C., Prabhakaran, V., & Diggavi, S. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2399-2403, July, 2013.
Arxiv doi abstract bibtex We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.
@inproceedings{6620656,
abstract = {We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.},
author = {Mishra, S. and Fragouli, C. and Prabhakaran, V. and Diggavi, S.},
booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},
doi = {10.1109/ISIT.2013.6620656},
issn = {2157-8095},
month = {July},
pages = {2399-2403},
tags = {conf,WiNetSec,IT},
title = {Using feedback for secrecy over graphs},
type = {4},
url_arxiv = {http://arxiv.org/abs/1305.3051},
year = {2013}
}
Downloads: 0
{"_id":"YRuvwEopBqMpsGguX","bibbaseid":"mishra-fragouli-prabhakaran-diggavi-usingfeedbackforsecrecyovergraphs-2013","author_short":["Mishra, S.","Fragouli, C.","Prabhakaran, V.","Diggavi, S."],"bibdata":{"bibtype":"inproceedings","type":"4","abstract":"We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.","author":[{"propositions":[],"lastnames":["Mishra"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["Fragouli"],"firstnames":["C."],"suffixes":[]},{"propositions":[],"lastnames":["Prabhakaran"],"firstnames":["V."],"suffixes":[]},{"propositions":[],"lastnames":["Diggavi"],"firstnames":["S."],"suffixes":[]}],"booktitle":"Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on","doi":"10.1109/ISIT.2013.6620656","issn":"2157-8095","month":"July","pages":"2399-2403","tags":"conf,WiNetSec,IT","title":"Using feedback for secrecy over graphs","url_arxiv":"http://arxiv.org/abs/1305.3051","year":"2013","bibtex":"@inproceedings{6620656,\n abstract = {We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.},\n author = {Mishra, S. and Fragouli, C. and Prabhakaran, V. and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620656},\n issn = {2157-8095},\n month = {July},\n pages = {2399-2403},\n tags = {conf,WiNetSec,IT},\n title = {Using feedback for secrecy over graphs},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1305.3051},\n year = {2013}\n}\n\n","author_short":["Mishra, S.","Fragouli, C.","Prabhakaran, V.","Diggavi, S."],"key":"6620656","id":"6620656","bibbaseid":"mishra-fragouli-prabhakaran-diggavi-usingfeedbackforsecrecyovergraphs-2013","role":"author","urls":{" arxiv":"http://arxiv.org/abs/1305.3051"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/network/files/e2kjGxYgtBo8SWSbC","dataSources":["hicKnsKYNEFXC4CgH","jxCYzXXYRqw2fiEXQ","wCByFFrQMyRwfzrJ6","yuqM5ah4HMsTyDrMa","YaM87hGQiepg5qijZ","n9wmfkt5w8CPqCepg","soj2cS6PgG8NPmWGr","FaDBDiyFAJY5pL28h","ycfdiwWPzC2rE6H77"],"keywords":[],"search_terms":["using","feedback","secrecy","over","graphs","mishra","fragouli","prabhakaran","diggavi"],"title":"Using feedback for secrecy over graphs","year":2013}