{"title":"基于线性化Reed-Solomon码的可靠安全多镜头网络编码","authors":"Umberto Martínez-Peñas, F. Kschischang","doi":"10.1109/ALLERTON.2018.8635644","DOIUrl":null,"url":null,"abstract":"Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to t links, erase up to $\\rho$ packets, and wire-tap up to $\\mu$ links, all throughout $\\ell$ shots of a (random) linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of $\\ell n'-2t-\\rho-\\mu$ packets, where $n'$ is the number of outgoing links at the source, for any packet length $m \\geq n'$ (largest possible range), with only the restriction that $\\ell \\lt q$ (size of the base field). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length $n = \\ell n'$, and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes\",\"authors\":\"Umberto Martínez-Peñas, F. Kschischang\",\"doi\":\"10.1109/ALLERTON.2018.8635644\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to t links, erase up to $\\\\rho$ packets, and wire-tap up to $\\\\mu$ links, all throughout $\\\\ell$ shots of a (random) linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of $\\\\ell n'-2t-\\\\rho-\\\\mu$ packets, where $n'$ is the number of outgoing links at the source, for any packet length $m \\\\geq n'$ (largest possible range), with only the restriction that $\\\\ell \\\\lt q$ (size of the base field). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length $n = \\\\ell n'$, and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication.\",\"PeriodicalId\":299280,\"journal\":{\"name\":\"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)\",\"volume\":\"2018 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ALLERTON.2018.8635644\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ALLERTON.2018.8635644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes
Multishot network coding is considered in a worst-case adversarial setting in which an omniscient adversary with unbounded computational resources may inject erroneous packets in up to t links, erase up to $\rho$ packets, and wire-tap up to $\mu$ links, all throughout $\ell$ shots of a (random) linearly-coded network. Assuming no knowledge of the underlying linear network code (in particular, the network topology and underlying linear code may change with time), a coding scheme achieving zero-error communication and perfect secrecy is obtained based on linearized Reed-Solomon codes. The scheme achieves the maximum possible secret message size of $\ell n'-2t-\rho-\mu$ packets, where $n'$ is the number of outgoing links at the source, for any packet length $m \geq n'$ (largest possible range), with only the restriction that $\ell \lt q$ (size of the base field). By lifting this construction, coding schemes for non-coherent communication are obtained with information rates close to optimal for practical instances. A Welch-Berlekamp sum-rank decoding algorithm for linearized Reed-Solomon codes is provided, having quadratic complexity in the total length $n = \ell n'$, and which can be adapted to handle not only errors, but also erasures, wire-tap observations and non-coherent communication.