In this paper, we present a new class of public-key cryptosystem (PKC) using algebraic coding on the basis of superimposition and randomness. The proposed PKC is featured by a generator matrix, in a characteristic for...
详细信息
In this paper, we present a new class of public-key cryptosystem (PKC) using algebraic coding on the basis of superimposition and randomness. The proposed PKC is featured by a generator matrix, in a characteristic form, where the generator matrix of an algebraic code is repeatedly used along with the generator matrix of a random code, as submatrices. This generator matrix, in the characteristic form, will be referred to as K-matrix. We show that the K-matrix yields the following advantages compared with the conventional schemes: (i) It realizes an abundant supply of PKCs, yielding more secure PKCs, (ii) It realizes a short public key.
The capacity of multiuser networks has been a long-standing problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to approximate multiuser wireless networks. This model...
详细信息
The capacity of multiuser networks has been a long-standing problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to approximate multiuser wireless networks. This model, known as the ADT network model, takes into account the broadcast nature as well as the multiuser interference inherent in the wireless medium. For the types of connections we consider, we show that the results of Avestimehr et al. under the ADT model can be reinterpreted within the algebraic network coding framework introduced by Koetter and Medard. Using this framework, we propose an efficient distributed linear code construction for the deterministic wireless multicast relay network model. Unlike several previous coding schemes, we do not attempt to find flows in the network. Instead, for a layered network, we maintain an invariant where it is required that at each stage of the code construction, certain sets of codewords are linearly independent.
We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al., who examined the network ca...
详细信息
We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al., who examined the network capacity of multicast networks, we extend the network coding framework to arbitrary networks and robust networking. For networks which are restricted to using linear network codes, we find necessary and sufficient conditions for the feasibility of any given set of connections over a given network. We also consider the problem of network recovery for nonergodic link failures. For the multicast setup we prove that there exist coding strategies that provide maximally robust networks and that do not require adaptation of the network interior to the failure pattern in question. The results are derived for both delay-free networks and networks with delays.
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational *** order to reduce the security overhead of the existing solutions for secur...
详细信息
Existing solutions against wiretapping attacks for network coding either bring significant bandwidth overhead or incur a high computational *** order to reduce the security overhead of the existing solutions for securing network coding,a novel securing network coding paradigm is presented relying on two coding models:intra-generation coding and inter-generation *** basic idea to secure network coding using intra-generation coding is to limit the encryption operations for each generation,and then subject the scrambled and the remaining original source vectors to a linear *** method is then generalized seamlessly using inter-generation coding by further exploiting the algebraic structure of network *** show that the proposed schemes have properties of low-complexity security,little bandwidth consumption,and high efficiency in integrating with the existing security techniques effectively.
In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the network can be utilized. In this paper, we p...
详细信息
In the paradigm of network coding, the nodes in a network are allowed to encode the information received from the input links. With network coding, the full capacity of the network can be utilized. In this paper, we propose a model, call the wiretap network, that incorporates information security with network coding. In this model, a collection of subsets of the channels in the network is given, and a wiretapper is allowed to access any one (but not more than one) of these subsets without being able to obtain any information about the message transmitted. Our model includes secret sharing in classical cryptography as a special case. We present a construction of secure linear network codes that can be used provided a certain graph-theoretic condition is satisfied. We also prove the necessity of this condition for the special case that the wiretapper may choose to access any subset of channels of a fixed size. The optimality of our code construction is established for this special case. Finally, we extend our results to the scenario when the wiretapper is allowed to obtain a controlled amount of information about the message.
In this work, we extend the notion of generalized Hamming weight for classical linear block codes to linear network codes by introducing the network generalized Hamming weight (NGHW) for a given network with respect t...
详细信息
In this work, we extend the notion of generalized Hamming weight for classical linear block codes to linear network codes by introducing the network generalized Hamming weight (NGHW) for a given network with respect to a fixed linear network code. The basic properties of NGHW are studied. We further show that NGHW can be used as a tool to characterize the security performance of a linear network code on a wiretap network. We also introduce the notion of network maximum distance separable code (NMDS code) by extending the notion of Maximum Distance Separable code in classical algebraic coding theory. We prove that NMDS codes play an important role in minimizing the information that an eavesdropper can obtain from the network.
Jing and Hassibi recently presented a detailed analysis on the problem of distributed space-time coding for a synchronized wireless relay network, where only linear transforms are implemented at relay nodes, and propo...
详细信息
Jing and Hassibi recently presented a detailed analysis on the problem of distributed space-time coding for a synchronized wireless relay network, where only linear transforms are implemented at relay nodes, and proposed a linear dispersion coding scheme. In this letter, we extend it to asynchronous wireless networks by employing OFDM to combat timing errors from relay nodes. Based on a layered structure, we present a distributed space-time code design achieving full spatial diversity for an asynchronous wireless relay network.
Let A = F[x]/, where f (x) is a monic polynomial over a finite field F. In this paper, we study the relation between A-codes and their duals. In particular, we state a counterexample and a correction to a theorem of B...
详细信息
Let A = F[x]/< f(x)>, where f (x) is a monic polynomial over a finite field F. In this paper, we study the relation between A-codes and their duals. In particular, we state a counterexample and a correction to a theorem of Berger and El Amrani (2014) [3] and present an efficient algorithm to find a system of generators for the dual of a given A-code. Also we characterize self-dual A-codes of length 2 and investigate when the F-dual of A-codes are A-codes. (C) 2017 Elsevier Inc. All rights reserved.
One of the key problems in DNA computation is the design of large and reliable codes. Due to the biological and chemical restrictions, DNA codes need to satisfy certain constraints. Here, we provide an algebraic proce...
详细信息
One of the key problems in DNA computation is the design of large and reliable codes. Due to the biological and chemical restrictions, DNA codes need to satisfy certain constraints. Here, we provide an algebraic procedure to construct DNA codes by using homomorphism of groups. The construction procedure is used to determine mutation.
作者:
Fan, PYTsing Hua Univ
Dept Elect Engn State Key Lab Microwave & Digital Commun Beijing 100084 Peoples R China
Diagonal algebraic space time (DAST) block codes was proved to outperform the codes from orthogonal design with the equivalent spectral efficiency when the number of transmit antennas employed is larger than 2. Howeve...
详细信息
ISBN:
(纸本)7505350668
Diagonal algebraic space time (DAST) block codes was proved to outperform the codes from orthogonal design with the equivalent spectral efficiency when the number of transmit antennas employed is larger than 2. However, due to the limitation on the signal constellation with complex integer points, no good 3bits/symbol DAST block code was not given previously. In this paper, we propose a general form of 8-star-PSK constellations with integer points and present some theoretical results on the performance of the equivalent 8-star-PSK modulations. By using our proposed 8-star-PSKs, we present a searching algorithm to construct optimal DAST codes with 3 bits per symbol under some criteria and investigate their performances. over flat Rayleigh fading channels.
暂无评论