Network Coding with Myopic Adversaries

02/19/2021
by   Sijie Li, et al.
0

We consider the problem of reliable communication over a network containing a hidden myopic adversary who can eavesdrop on some z_ro links, jam some z_wo links, and do both on some z_rw links. We provide the first information-theoretically tight characterization of the optimal rate of communication possible under all possible settings of the tuple (z_ro,z_wo,z_rw) by providing a novel coding scheme/analysis for a subset of parameter regimes. In particular, our vanishing-error schemes bypass the Network Singleton Bound (which requires a zero-error recovery criteria) in a certain parameter regime where the capacity had been heretofore open. As a direct corollary we also obtain the capacity of the corresponding problem where information-theoretic secrecy against eavesdropping is required in addition to reliable communication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2020

Network Coding-Based Post-Quantum Cryptography

We propose a novel hybrid universal network-coding cryptosystem (HUNCC) ...
research
05/10/2018

Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes

Multishot network coding is considered in a worst-case adversarial setti...
research
05/08/2018

Multipath Stealth Communication with Jammers

We consider the problem of stealth communication over a multipath networ...
research
05/07/2018

Covert Communication over Adversarially Jammed Channels

We consider a situation in which a transmitter Alice may wish to communi...
research
05/24/2018

Ultra-Reliable Communication over Arbitrarily Varying Channels under Block-Restricted Jamming

Ultra-Reliable Communication (URC) is examined in an information-theoret...
research
01/11/2018

Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement

The rate regions of many variations of the standard and wire-tap channel...
research
09/11/2018

The ε-error Capacity of Symmetric PIR with Byzantine Adversaries

The capacity of symmetric private information retrieval with K messages,...

Please sign up or login with your details

Forgot password? Click here to reset