Secure Network Function Computation for Linear Functions – Part I: Source Security

07/14/2022
by   Xuan Guang, et al.
0

In this paper, we put forward secure network function computation over a directed acyclic network. In such a network, a sink node is required to compute with zero error a target function of which the inputs are generated as source messages at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, is not allowed to obtain any information about a security function of the source messages. The secure computing capacity for the above model is defined as the maximum average number of times that the target function can be securely computed with zero error at the sink node with the given collection of wiretap sets and security function for one use of the network. The characterization of this capacity is in general overwhelmingly difficult. In the current paper, we consider securely computing linear functions with a wiretapper who can eavesdrop any subset of edges up to a certain size r, referred to as the security level, with the security function being the identity function. We first prove an upper bound on the secure computing capacity, which is applicable to arbitrary network topologies and arbitrary security levels. When the security level r is equal to 0, our upper bound reduces to the computing capacity without security consideration. We discover the surprising fact that for some models, there is no penalty on the secure computing capacity compared with the computing capacity without security consideration. We further obtain an equivalent expression of the upper bound by using a graph-theoretic approach, and accordingly we develop an efficient approach for computing this bound. Furthermore, we present a construction of linear function-computing secure network codes and obtain a lower bound on the secure computing capacity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/11/2022

Network Function Computation With Different Secure Conditions

In this paper, we investigate function computation problems under differ...
research
05/09/2018

Zero-error Function Computation on a Directed Acyclic Network

We study the rate region of variable-length source-network codes that ar...
research
05/11/2023

Zero-Error Distributed Function Compression for Binary Arithmetic Sum

In this paper, we put forward the model of zero-error distributed functi...
research
11/06/2018

Local-Encoding-Preserving Secure Network Coding---Part I: Fixed Security Level

Information-theoretic security is considered in the paradigm of network ...
research
11/06/2018

Local-Encoding-Preserving Secure Network Coding---Part II: Flexible Rate and Security Level

In the two-part paper, we consider the problem of secure network coding ...
research
01/10/2019

On Secure Capacity of Multiple Unicast Traffic over Two-Layer Networks

This paper studies the problem of secure communication over two-layer ne...
research
01/28/2021

Security, Fault Tolerance, and Communication Complexity in Distributed Systems

We present efficient and practical algorithms for a large, distributed s...

Please sign up or login with your details

Forgot password? Click here to reset