数学季刊 ›› 2016, Vol. 31 ›› Issue (1): 60-68.doi: 10.13371/j.cnki.chin.q.j.m.2016.01.008

• • 上一篇    下一篇

一种有效的安全网络编码构造

  

  1. 1. School of Science, Henan University of Technology2. School of Mathematics and Statistics, Henan University
  • 收稿日期:2015-10-19 出版日期:2016-03-30 发布日期:2020-11-18
  • 作者简介:ZHANG Jing-li(1979-), female, native of Xuchang, Henan, a lecturer of Henan University of Technology, M.S.D., engages in the theory of Coding; TANG Ping(corresponding author)(1979-), female, native of Nanyang, Henan, a lecturer of Henan University, M.S.D., engages in the theory of coding.
  • 基金资助:
    Supported by the National Natural Science Foundation of China(61201253);

An Efficient Construction of Secure Network Coding

  1. 1. School of Science, Henan University of Technology2. School of Mathematics and Statistics, Henan University
  • Received:2015-10-19 Online:2016-03-30 Published:2020-11-18
  • About author:ZHANG Jing-li(1979-), female, native of Xuchang, Henan, a lecturer of Henan University of Technology, M.S.D., engages in the theory of Coding; TANG Ping(corresponding author)(1979-), female, native of Nanyang, Henan, a lecturer of Henan University, M.S.D., engages in the theory of coding.
  • Supported by:
    Supported by the National Natural Science Foundation of China(61201253);

摘要: Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q-1. They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction. 

关键词: secure network coding, global encoding kernel, local encoding kernel, wiretap, block lower triangular matrix

Abstract: Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q-1. They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction. 

Key words: secure network coding, global encoding kernel, local encoding kernel, wiretap; block lower triangular matrix

中图分类号: