This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: School of Data Science, The Chinese University of Hong Kong, Shenzhen, Longgang 518172, China 22institutetext: International Quantum Academy (SIQA), Futian, Shenzhen 518048, China 33institutetext: Graduate School of Mathematics, Nagoya University, Chikusa-ku, Nagoya 464-8602, Japan
33email: [email protected]

Secure network coding with adaptive and active attackthanks: Supported in part by the National Natural Science Foundation of China under Grant 62171212.

Masahito Hayashi 112233 0000-0003-3104-1000
Abstract

Ning Cai and the author jointly studied secure network codes over adaptive and active attacks, which were rarely studied until these seminal papers. This paper reviews the result for secure network code over adaptive and active attacks. We focus on two typical network models, a one-hop relay network and a unicast relay network.

Keywords:
one-hop relay network unicast relay network non-linear code anti-Latin square.

1 Introduction

Network coding is a key technology for communication over a network. Secure network coding protects our communication from various attacks. However, the majority of existing studies addressed deterministic and passive attacks, and did not care about the effect of adaptive changes on attacked edges and active modification on the information on attacked edge [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14]. The communication over a network has a risk that an adversary, Eve, can improve her ability by using adaptive and active operations. In several joint papers [15, 16, 17, 18, 19], Ning Cai and the author jointly studied how adaptive and active operations can improve Eve’s performance. This paper reviews these joint studies. Since the original paper [19] contains complicated descriptions and a certain error, this paper presents the corrected contents based on its correction [20]. In addition, the paper [19] discussed the difference between the existence and the non-existence of random number at intermediate nodes. Also, the paper [19] treated the correctness and the secrecy in an asymmetric way. In this paper, we adopt the base 22 of the logarithm.

The outline of this paper is the following. This paper explains why such an asymmetric treatment is reasonable by citing the recent paper [21] in Section 2. Then, Section 2 introduces these two kinds of formulations based on the existence and the non-existence of random number at intermediate nodes. Section 3 analyzes rr-wiretap network based on the above mentioned formulations. Section 4 introduces two kinds of unconventional attack models, adaptive attack and active attack. Section 5 explains that secure communication is impossible in one-hop relay network under the non-existence of random number at intermediate nodes even when neither adaptive attack nor active attack is allowed for Eve. Section 6 introduces non-linear codes to resolve this problem. Section 8 shows adaptive attacks the above non-linear codes over one-hop relay network. Section 7 shows active attacks the above non-linear codes over one-hop relay network. Section 9 presents the usage of vector-linear code over one-hop relay network. Section 10 derives the capacities under adaptive and active attacks over unicast relay network. Section 11 makes conclusion.

2 Security model and coding model

Secure network coding has two kinds of security measures. One is the correctness of the decoding message, and the other is the secrecy of the transmitted message. Also, secure network coding considers the set of possible attacks. The usual setting requires the correctness and the secrecy when one of possible attack is done. However, when this requirement is imposed to our code, it is often difficult to realize a larger transmission rate. To realize a better transmission rate, it is possible to discount the requirement as follows. The discounted setting requires the secrecy when one of possible attack is done, but it requires the correctness only when no attack is made. This requirement is useful when the sender, Alice, and the receiver, Bob, share a small size of secret random number and they can use public channel due to the following reason.

As explained in [21], this discounted setting is reasonable as follows even for the message transmission. In this case, after the communication, Alice and Bob can apply error verification by using a small size of secret random number and public channel [21, Section VI], [22, Section VIII], [23, Section III-C-2)]. If an error is detected, they abort the protocol. Since the attack is limited to an element of the set of possible attacks, the requirement guarantees that the secrecy of the message is kept even in this case. Once the error verification is passed, the error verification guarantees the correctness. As explained in [21, Section VI], [22, Section VIII], [23, Section III-C-2)], when the size of the transmitted message is nn bits, the error verification consumes a polynomial amount of resources with respect to logn\log n. Thus, the error verification does not affect the transmission rate of the whole protocol. Due to this reason, this paper focuses on the discounted setting.

This paper adopts two kinds of formulations for our codes depending on the resources on intermediate nodes. In the first formulation, an arbitrary node including an intermediate node can generate an arbitrary random number. In the second formulation, only the source node and the destination node can generate an arbitrary random number so that an intermediate node cannot. This paper adopts both formulations for our codes.

This paper considers two kinds of linear codes. When transmitted information on each edge in a code is given as a single element, i.e., a scalar, of a finite field 𝔽q\mathbb{F}_{q} or a quotient ring d\mathbb{Z}_{d} and a coding operation on each node is given as linear operations over input or incoming information, the code is called a scalar-linear code. When transmitted information on each edge in a code is given as a vector on a finite field 𝔽q\mathbb{F}_{q} or a quotient ring d\mathbb{Z}_{d} and a coding operation on each node is given as linear operations over input or incoming information, the code is called a vector-linear code. The paper [18] showed the following lemma.

3 Two kinds of formulations over single source and single terminal network model

To consider the relation between two kinds of formulations for our codes, we consider an acyclic network with a single source and a single terminal, where Eve is allowed to select an arbitrary rr-subset channels to access, which is called rr-wiretap network [1, 2, 24, 25]. We define the first capacity C1C_{1} as the maximum transmission rate when random number generation is allowed in an arbitrary intermediate node. We define the second capacity C2C_{2} as the maximum transmission rate when random number generation is not allowed in an arbitrary intermediate node. For our analysis on the capacities of the given network, we introduce two kinds of minimum cuts. A node is called a pseudo source node when the node has only outgoing edges but has no original message to be transmitted. Since a pseudo source node is not the source node nor the terminal node, it is classified as an intermediate node. The first kind of minimum cut mincut1\mathop{\rm mincut}\nolimits_{1} is the minimum number of edges crossing a line separating the source and terminal nodes. The second kind of minimum cut mincut2\mathop{\rm mincut}\nolimits_{2} is the minimum number of edges crossing a line separating the source and terminal nodes when we remove all edges outgoing from pseudo source nodes. Edges out-going from pseudo source nodes are counted in mincut1\mathop{\rm mincut}\nolimits_{1}, but are not counted in mincut2\mathop{\rm mincut}\nolimits_{2}.

Lemma 1 ([19, (35), (36), and Example 1])

For rr-wiretap network, we have

C2=\displaystyle C_{2}= mincut2r,\displaystyle\mathop{\rm mincut}\nolimits_{2}-r, (1)
mincut2rC1\displaystyle\mathop{\rm mincut}\nolimits_{2}-r\leq C_{1}\leq mincut1r.\displaystyle\mathop{\rm mincut}\nolimits_{1}-r. (2)

\square

As a special case analysis, we have the following corollary.

Corollary 1 ([19, Example 1])

When an rr-wiretap network has no pseudo source node, we have

C2=C1=mincut1r.\displaystyle C_{2}=C_{1}=\mathop{\rm mincut}\nolimits_{1}-r. (3)

\square

The network given in Fig. 1 shows that a network has different rates mincut1\mathop{\rm mincut}\nolimits_{1} and mincut2\mathop{\rm mincut}\nolimits_{2}. This network has a linear code to realize mincut1r\mathop{\rm mincut}\nolimits_{1}-r when r=2r=2, which implies the equality of the second inequality in (2). Since C1=1C_{1}=1 and C2=0C_{2}=0, C1C_{1} is strictly larger C2C_{2}.

Refer to caption
Figure 1: rr-wiretap network with equality of the second inequality in (2). Node 1 is the source node and Node 6 is the terminal node. Node 5 is a pseudo source node. Thus, mincut2=2\mathop{\rm mincut}\nolimits_{2}=2 and mincut1=3\mathop{\rm mincut}\nolimits_{1}=3. When intermediate nodes are allowed to generate random variables, the presented code achieves mincut1r\mathop{\rm mincut}\nolimits_{1}-r when r=2r=2. The source node (Node 1) has the message MM and two scramble variables L1,L2L_{1},L_{2}. The pseudo source node (Node 5) has another scramble variable L3L_{3}. Even when Eve wiretaps arbitrary two edges, she cannot get arbitrary information for the message MM.

4 Unconventional attack models

This paper aims to discuss two unconventional types of attacks when the network model has a multiple-layer structure, like a one-hop relay network. When a one-hop relay network is given, a conventional type of attack is given as Fig. 4. One is an active attack as Fig. 4. In order to get more information, the eavesdropper changes the information on attacked edges. That is, after the above modification on the first attacked edge, the eavesdropper, Eve, may have a possibility to get more information via the second attack. Such an attack is called an active attack. If the attack is not an active attack, it is called a passive attack.

To discuss an active attack, we need to be careful for the causality and the time-ordering. The paper [18] carefully handled this problem, and showed the following theorem, which guarantees that an arbitrary active attack cannot improve Eve’s information when the code is linear.

Theorem 4.1 ([18, Theorem 1])

Suppose that coding operations on all nodes are linear. The information that Eve gets via an active attack on edges can be simulated by Eve by using the information that Eve gets via a passive attack on the same edges. \square

Although the paper [26] addressed a part of active attacks, its treatment is limited to a limited class of active attacks. The paper [16] covers a more general class of active attacks.

The second is an adaptive attack as Fig. 4. In order to get more information, Eve changes what edge is to be attacked according the information on the previous attacks. Such an attack is called an adaptive attack. If the attack is not an adaptive attack, it is called a deterministic attack. That is, a conventional attack is called a deterministic and passive attack.

[Uncaptioned image]
Figure 2: Deterministic and passive attack over one-hop relay network
[Uncaptioned image]
Figure 3: Active attack over one-hop relay network
[Uncaptioned image]
Figure 4: Adaptive attack over one-hop relay network

5 Problem over one-hop relay network

First, we consider a one-hop relay network as Fig. 4. This network has only one intermediate node in addition to the source node and the destination node. The intermediate node connects with the source node via two edges, i.e., two channels, e(1)e(1) and e(2)e(2). Also, the intermediate node connects with the destination node via two edges, i.e., two channels, e(3)e(3) and e(4)e(4). The aim of this network is the following. Alice intends to her message from the source node to Bob at the destination node. Here, we consider two types of attacks by an adversary, Eve. In the passive attack, Eve can eavesdrop on two edges in total, i.e., she can eavesdrop on one edge among e(1)e(1) and e(2)e(2), and can another edge among e(3)e(3) and e(4)e(4). In the active attack, Eve is allowed to change it to get more information.

Here, for the secrecy, we adopt imperfect secrecy as follows. When MM is the message and Eve’s information ZEZ_{E} satisfies the condition I(M;ZE)=0I(M;Z_{E})=0 for all of Eve’s possible attacks, the code is called perfectly secret. When the condition I(M;ZE)<logdI(M;Z_{E})<\log d holds for all of Eve’s possible attacks, the code is called imperfectly secret [27] (or weakly secret). Otherwise, it is called insecure. In other words, our code is imperfectly secret, when there exists no function ψ~\tilde{\psi} such that ψ~(ZE)=M\tilde{\psi}(Z_{E})=M. Also, we say that the code is perfectly secret, when ZEZ_{E} is Eve’s information and I(M;ZE)=0I(M;Z_{E})=0 for all Eve’s possible attacks.

We choose LdL\in\mathbb{Z}_{d} as the uniform scramble random variable generated at the source node. Suppose that the intermediate node generates another uniform scramble random variable LpL^{\prime}\in\mathbb{Z}_{p}. We introduce a scalar-linear code as follows.

Y1:=L,Y2:=M+L.\displaystyle Y_{1}:=L,\quad Y_{2}:=M+L. (4)

Then, the intermediate node applies the code φ\varphi as

Y3:=L,Y4:=Y2Y1+L.\displaystyle{Y}_{3}:=L^{\prime},\quad{Y}_{4}:=Y_{2}-Y_{1}+L^{\prime}. (5)

The decoder ψ\psi is written as ψ(Y3,Y4):=Y4Y3\psi({Y}_{3},{Y}_{4}):={Y}_{4}-{Y}_{3}, which equals Y2Y1+LL=M+LL+LL=MY_{2}-Y_{1}+L^{\prime}-L^{\prime}=M+L-L+L^{\prime}-L^{\prime}=M. This code satisfies the correctness. The pair (Y1,Y3)(Y_{1},Y_{3}) is independent of MM. Similarly, the pairs (Y1,Y4)(Y_{1},Y_{4}), (Y2,Y3)(Y_{2},Y_{3}), and (Y2,Y4)(Y_{2},Y_{4}) are independent of MM. Thus, this code is perfectly secret for passive attacks, and has the transmission rate logd\log d.

Even when Eve selects the attacked edge e(3)e(3) or e(4)e(4) based on the observation on the first attack, Eve gets no information for the message MM. Hence, this code is secret even for an adaptive attack. Due to the linearity, even when Eve changes the information on the first attacked edge, Eve cannot improve her performance due to Theorem 4.1. Thus, this code is secret even for an adaptive and active attack.

However, when the intermediate node cannot generate a uniform scramble random variable, no scalar-linear code is imperfectly secret over a quotient ring d\mathbb{Z}_{d} for passive attacks, as shown in [17, Theorem 1]. In other words, for an arbitrary scalar-linear code over a quotient ring d\mathbb{Z}_{d}, Eve has a passive attack to recover the message MM perfectly.

6 Non-linear codes over one-hop relay network

To realize imperfect secrecy without random number generation on the intermediate node, we introduce the following non-linear code. For simplicity, it is assumed that Alice transmits only the message MdM\in\mathbb{Z}_{d} and an arbitrary edge can transmit only one binary information. We consider the following code, which requires the binary uniform scramble random variable LdL\in\mathbb{Z}_{d} at the source node.

The encoder ϕ\phi is given in the same way as (4). Then, our non-linear code φ\varphi in the intermediate node is given as

Y3:=Y1(Y2Y1),Y4:=(Y1+1)(Y2Y1).\displaystyle{Y}_{3}:={Y}_{1}({Y}_{2}-{Y}_{1}),\quad{Y}_{4}:=({Y}_{1}+1)({Y}_{2}-{Y}_{1}). (6)

The decoder ψ\psi is given as ψ(Y3,Y4):=Y3+Y4\psi({Y}_{3},{Y}_{4}):={Y}_{3}+{Y}_{4}. In this code, Y3{Y}_{3} and Y4{Y}_{4} have the following form;

Y3=LM,Y4=LM+M.\displaystyle{Y}_{3}=LM,\quad{Y}_{4}=LM+M. (7)

Thus, the decoder recovers MM as Y4Y3Y_{4}-Y_{3} nevertheless the value of LL. We call the above code the standard non-linear code.

Consider the case when Eve eavesdrops Y1=LY_{1}=L in the first step. Suppose that Eve eavesdrops Y3Y_{3} in the second step. When LL is invertible, she can recover MM by Y11Y3Y_{1}^{-1}Y_{3}. But, when LL is not invertible, she cannot recover MM because the map MLMM\mapsto LM is not one-to-one. Suppose that Eve eavesdrops Y4Y_{4} in the second step When L+1L+1 is invertible, she can recover MM by (Y1+1)1Y4(Y_{1}+1)^{-1}Y_{4}. But, when L+1L+1 is not invertible, she cannot recover MM because the map M(L+1)MM\mapsto(L+1)M is not one-to-one.

Consider the case when Eve eavesdrops Y2=M+LY_{2}=M+L in the first step. Suppose that Eve eavesdrops Y3Y_{3} in the second step. To recover MM, she needs to find MM to satisfy Y3=Y2MM2Y_{3}=Y_{2}M-M^{2}. However, the map MY2MM2M\mapsto Y_{2}M-M^{2} is not always one-to-one. For example, when d=2d=2 and Y2=1Y_{2}=1, Y2MM2Y_{2}M-M^{2} is always zero. Also, when d>2d>2 and Y2=0Y_{2}=0, Y2MM2Y_{2}M-M^{2} has the same value with M=1,1M=1,-1. Thus, Eve cannot recover the original information MM. Suppose that Eve eavesdrops Y4Y_{4} in the second step. To recover MM, she needs to find MM to satisfy Y4=Y2M+MM2Y_{4}=Y_{2}M+M-M^{2}. Similarly, the map MY2M+MM2M\mapsto Y_{2}M+M-M^{2} is not always one-to-one. For example, when d=2d=2 and Y2=0Y_{2}=0, Y2M+MM2Y_{2}M+M-M^{2} is always zero. Also, when d>2d>2 and Y2=1Y_{2}=-1, Y2M+MM2Y_{2}M+M-M^{2} has the same value with M=1,1M=1,-1. In this way, we find that this code is imperfectly secret for deterministic and passive attacks. That is, there exists a secret code over deterministic and passive attacks.

When d=2d=2, The reference [17, Appendix] calculated the mutual information, i.e., the amount of information leakage as follows.

I(M;Y1,Y3)=I(M;Y1,Y4)=I(M;Y2,Y3)=I(M;Y2,Y4)=12,\displaystyle I(M;{Y}_{1},{Y}_{3})=I(M;{Y}_{1},{Y}_{4})=I(M;{Y}_{2},{Y}_{3})=I(M;{Y}_{2},{Y}_{4})=\frac{1}{2}, (8)

Further, as shown in Lemma 2 with d=2d=2, when Eve cannot recover the message MM perfectly with an arbitrary deterministic and passive attack in the code, the network code is limited to the standard non-linear code or a code equivalent to the standard non-linear code.

Lemma 2 ([17, Lemma 1])

Suppose that d=2d=2 and a code (ϕ,φ,ψ)(\phi,\varphi,\psi) satisfies the following conditions. Let Y1Y_{1} and Y2Y_{2} be the random variables generated by the encoder ϕ\phi when MM is subject to the uniform distribution. We assume that the random variables (Y3,Y4):=φ(Y1,Y2)(Y_{3},Y_{4}):=\varphi(Y_{1},Y_{2}) satisfies the following conditions.

(C1)

The relation ψ(Y3,Y4)=M\psi(Y_{3},Y_{4})=M holds.

(C2)

There is no deterministic function ψ~\tilde{\psi} from 22\mathbb{Z}_{2}^{2} to 2\mathbb{Z}_{2} satisfying one of the following conditions.

ψ~(Y1,Y3)=M,ψ~(Y1,Y4)=M,\displaystyle\tilde{\psi}(Y_{1},Y_{3})=M,\quad\tilde{\psi}(Y_{1},Y_{4})=M, (9)
ψ~(Y2,Y3)=M,ψ~(Y2,Y4)=M.\displaystyle\tilde{\psi}(Y_{2},Y_{3})=M,\quad\tilde{\psi}(Y_{2},Y_{4})=M. (10)

Then, there exist single-input functions f1,f2,f3,f4,f5f_{1},f_{2},f_{3},f_{4},f_{5} on 2\mathbb{Z}_{2} such that Y¯i:=fi(Yi)\bar{Y}_{i}:=f_{i}(Y_{i}) and M¯:=f5(M)\bar{M}:=f_{5}(M) satisfy (6) and (4) with a scramble random variable LL while the variable LL might be correlated with MM. \square

However, the above theorem does not holds when d>2d>2. In this case, the paper [17] proposed another non-linear code. For this aim, the paper [17] introduced an anti-Latin square. A matrix (ai,j)(a_{i,j}) on d\mathbb{Z}_{d} is called an anti-Latin square when each row and each column have duplicate elements, which is the opposite requirement to a Latin square. For example, the following shows 3×33\times 3 and 4×44\times 4 anti-Latin square matrices.

(010112022),(022010112),(0133012011230223),(0010111232223033).\displaystyle\left(\begin{array}[]{ccc}0&1&0\\ 1&1&2\\ 0&2&2\end{array}\right),\quad\left(\begin{array}[]{ccc}0&2&2\\ 0&1&0\\ 1&1&2\end{array}\right),\quad\left(\begin{array}[]{cccc}0&1&3&3\\ 0&1&2&0\\ 1&1&2&3\\ 0&2&2&3\end{array}\right),\quad\left(\begin{array}[]{cccc}0&0&1&0\\ 1&1&1&2\\ 3&2&2&2\\ 3&0&3&3\end{array}\right). (25)

Using a pair of d×dd\times d anti-Latin square matrices (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}), the paper [17] proposed a non-linear code as follows. The encoder ϕ\phi is given in the same way as (4). Then, our non-linear code φ\varphi in the intermediate node is given as

Y3:=aY1,Y2,Y4:=bY1,Y2.\displaystyle{Y}_{3}:=a_{Y_{1},Y_{2}},\quad{Y}_{4}:=b_{Y_{1},Y_{2}}. (26)

We call the above code the anti-Latin code of the pair of anti-Latin square matrices (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}).

For example, when the pair (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}) is chosen by the first and second matrices (or the the third and fourth matrices) in (25), the map (Y1,Y2)(aY1,Y2,bY1,Y2)(Y_{1},Y_{2})\mapsto(a_{Y_{1},Y_{2}},b_{Y_{1},Y_{2}}) is one-to-one. So, the anti-Latin code is uniquely decodable. To see the equivalent condition to the unique decodability, we define the set

Ξz,m(φ(3),φ(4)):=φ(4)({(l,l+m)|φ(3)(l,l+m)=z}) for z,md.\displaystyle\Xi_{z,m}(\varphi^{(3)},\varphi^{(4)}):=\varphi^{(4)}(\{(l,l+m)|\varphi^{(3)}(l,l+m)=z\})\hbox{ for }z,m\in\mathbb{Z}_{d}. (27)

When Y4=zY_{4}=z and M=mM=m, the set Ξz,m(φ(3),φ(4))\Xi_{z,m}(\varphi^{(3)},\varphi^{(4)}) expresses the possible values of Y4Y_{4}. Hence, the unique decodability is equivalent to the relation

Ξz,m(φ(3),φ(4))Ξz,m(φ(3),φ(4))= for mmd,zd.\displaystyle\Xi_{z,m}(\varphi^{(3)},\varphi^{(4)})\cap\Xi_{z,m^{\prime}}(\varphi^{(3)},\varphi^{(4)})=\emptyset\hbox{ for }m\neq m^{\prime}\in\mathbb{Z}_{d},~{}z\in\mathbb{Z}_{d}. (28)

Although there is no decodable anti-Latin code for d=2d=2, a decodable anti-Latin code exists for d>2d>2 as follows.

Lemma 3 ([17, Section V])

For d>2d>2, there exists a pair of d×dd\times d anti-Latin square matrices (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}) such that its anti-Latin code is decodable. \square

7 Active attack to non-linear code over one-hop relay network

Next, we consider active attacks over a one-hop relay network, as Fig. 4. Eve has the following two active attacks for the standard non-linear code.

(i)

When Eve attacks on e(1),e(3)e(1),e(3) and replaces Y1Y_{1} by 11, we have Y3+1Y1=MY_{3}+1-Y_{1}=M.

(ii)

When Eve attacks on e(1),e(4)e(1),e(4) and replaces Y1Y_{1} by 0, we have Y4Y1=MY_{4}-Y_{1}=M.

Therefore, the code presented in Section 8 is insecure under active attacks.

Since Lemma 2 guarantees the non-existence of another imperfectly secret code over deterministic and passive attacks for d=2d=2, the above discussion shows the non-existence of an imperfectly secret code over active attacks for d=2d=2.

However, Lemma 2 does not hold for d2d\neq 2. In fact, any anti-Latin code is imperfectly secret even under active attacks as follows. Assume that Eve eavesdrops e(1)e(1) and e(3)e(3). Even when Eve replaces Y1Y_{1} by any value, any row vector of ai,ja_{i,j} has duplicate elements. Hence, Eve has a possibility that she cannot recover the message from Y1Y_{1} and Y3Y_{3}. The same discussion can be applied to other pairs of edges eavesdropped by Eve.

8 Adaptive attack to non-linear code over one-hop relay network

Next, we discuss adaptive attacks over one-hop relay network even when active modification is not allowed. Eve has the following adaptive attack to recover the message MM, as Fig. 4.

(i)

First, Eve eavesdrops e(1)e(1). When Y1=1{Y}_{1}=1, she eavesdrops e(3)e(3), and recovers MM as Y3+1=Y21+1=M{Y}_{3}+1={Y}_{2}-1+1=M. When Y1=0{Y}_{1}=0, she eavesdrops e(4)e(4), and recovers MM as Y4=Y2=M{Y}_{4}={Y}_{2}=M.

Thus, the non-linear code given in Section 6 is not imperfectly secret for adaptive attacks. Since Lemma 2 guarantees the non-existence of another imperfectly secret code over deterministic and passive attacks for d=2d=2, there exists no imperfectly secure code over adaptive attacks in this network model with d=2d=2. This fact shows that an adaptive attack is powerful for this kind of non-linear code with d=2d=2 even when it has no active modification. In fact, when d=2d=2, Eve also has the following adaptive attack to recover the message MM.

(ii)

First, Eve eavesdrops e(2)e(2). When Y2=1{Y}_{2}=1, she eavesdrops e(4)e(4) and recovers MM as Y4=Y1+1=M{Y}_{4}={Y}_{1}+1=M. When Y2=0{Y}_{2}=0, she eavesdrops e(3)e(3) and recovers MM as Y3=Y1=M{Y}_{3}={Y}_{1}=M.

However, Lemma 2 does not hold for d2d\neq 2. In fact, any anti-Latin code is imperfectly secret even under adaptive and active attacks as follows. Assume that Eve eavesdrops e(1)e(1) at the first step. Even when Eve replaces Y1Y_{1} by any value, any row vector of (ai,j)(a_{i,j}) and any row vector of (bi,j)(b_{i,j}) have duplicate elements. When Eve observes such duplicate elements in the second observation, she cannot recover the message MM. Hence, whichever e(3)e(3) or e(4)e(4) Eve eavesdrops in the second step, she has a possibility that she cannot recover the message MM from her observed information. The same discussion can be applied to the case when Eve eavesdrops e(2)e(2) by considering column vectors of (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}). Therefore, there exists an imperfectly secret code for under adaptive and active attacks when d>2d>2.

The discussion of this section is based on the paper [19]. But, it did not discuss adaptive attacks for anti-Latin codes.

9 Vector-linear codes over one-hop relay network

To resolve this problem, we employ a vector-linear code. A vector-linear code can be realized when the network of Fig. 4 is used at least twice. Suppose that the source node generates three uniform scramble random variables L1,L2,L3dL_{1},L_{2},L_{3}\in\mathbb{Z}_{d}. Using these variables, we define a vector-linear code as follows. The first transmission sends the following;

Y1:=L1,Y2:=M+L1,\displaystyle{Y}_{1}:=L_{1},\quad{Y}_{2}:=M+L_{1}, (29)

and the second transmission sends the following;

Y1:=L2,Y2:=L3+L2,\displaystyle{Y}_{1}^{\prime}:=L_{2},\quad{Y}_{2}^{\prime}:=L_{3}+L_{2}, (30)

Then, the intermediate node applies the code φ\varphi as

Y3:=Y2Y1,Y4:=Y2Y1+Y2Y1.\displaystyle{Y}_{3}:=Y_{2}^{\prime}-Y_{1}^{\prime},\quad{Y}_{4}:=Y_{2}-Y_{1}+Y_{2}^{\prime}-Y_{1}^{\prime}. (31)

In this code, nothing is transmitted in the second layer at the second transmission. The decoder ψ\psi is given as ψ(Y3,Y4):=Y4Y3\psi({Y}_{3},{Y}_{4}):={Y}_{4}-{Y}_{3}, which equals Y2Y1+Y2Y1(Y2Y1)=M+L1L1=MY_{2}-Y_{1}+Y_{2}^{\prime}-Y_{1}^{\prime}-(Y_{2}^{\prime}-Y_{1}^{\prime})=M+L_{1}-L_{1}=M. Then, the pair (Y1,Y3)(Y_{1},Y_{3}) is independent of MM. Similarly, the pairs (Y1,Y4)(Y_{1},Y_{4}), (Y2,Y3)(Y_{2},Y_{3}), and (Y2,Y4)(Y_{2},Y_{4}) are independent of MM. Thus, this code is perfectly secret for deterministic attacks, and has the transmission rate 12logd\frac{1}{2}\log d. In the same reason as the above, this code is secret for adaptive attack. Then, due to the linearity, it is secure even for active and adaptive attacks.

The discussion until this section is summarized as Table 1.

Table 1: Summary for one hop relay network (Figs. 4-4) with single shot setting
Code deterministic active adaptive
and passive attack attack
attack
scalar-linear code over d\mathbb{Z}_{d} insecure insecure insecure
scalar-non-linear code over 2\mathbb{Z}_{2} imperfectly insecure insecure
secret
scalar-non-linear code imperfectly imperfectly imperfectly
over d\mathbb{Z}_{d} with d>2d>2 secret secret secret
vector-linear code over d\mathbb{Z}_{d} perfectly perfectly perfectly
secret secret secret

10 Non-local linear codes over unicast relay network

10.1 Capacity formula

The above type of codes can be generalized over unicast relay network. Before the detailed discussions, we remark on the relation between two kinds of linear codes over multiple uses of a given network. When coding operations on intermediate nodes are fixed to linear operations, such a model is called a linear network model. In this case, we have the freedom to design only coding operations in the source and destination nodes. Such coding operations are called an encoder and a decoder. Thus, operations at intermediate nodes are not designed. Such a code is called a local code, and was studied in the papers [19]. However, the code presented in Section 7 is not classified to this class of codes. In contrast, when all operations at intermediate nodes are designed to achieve a higher transmission rate, such a code is called a non-local code.

Refer to caption
Figure 5: Unicast relay network

In the following, we consider non-local codes over a unicast relay network given as Fig. 5. But, for simple discussion, we assume that each edge sends one element of a finite field 𝔽q\mathbb{F}_{q} instead of an element of d\mathbb{Z}_{d} for a single channel use. A unicast relay network is composed of the following group structure of the intermediate nodes. This network has c1c-1 intermediate nodes, which are labeled from the first intermediate node to the c1c-1-th intermediate node. It has only one source node and one terminal node, which are regarded as the 0-th node and the cc-th node, respectively. Each intermediate node has incoming edges and outgoing edges. For i=1,,ci=1,\ldots,c, this network has kik_{i} edges between the i1i-1 and ii-th nodes. At one channel use, each edge e(i,j)e(i,j) transmits the information Yi,j{Y}_{i,j} for i=1,,ci=1,\ldots,c and j=1,,kij=1,\ldots,k_{i} that takes values on {1,,d}\{1,\ldots,d\}.

In this model, it is assumed that Eve eavesdrops rir_{i} edges Yi,si:=(Yi,si(1),,Yi,si(ri))\vec{Y}_{i,s_{i}}:=({Y}_{i,s_{i}(1)},\ldots,{Y}_{i,s_{i}(r_{i})}) among kik_{i} edges Y¯i:=(Yi,j)j=1,,ki\overline{Y}_{i}:=({Y}_{i,j})_{j=1,\ldots,k_{i}} between the i1i-1 and ii-th nodes. Under this notation, the function sis_{i} expresses the edges eavesdropped by Eve. In other words, she can eavesdrop i=1cri\sum_{i=1}^{c}r_{i} edges totally. Eve is allowed to make adaptive and active attacks, which are stronger attacks than conventional attacks.

The first capacity C1C_{1} is defined as the maximum transmission rate when random number generation is allowed in an arbitrary intermediate node. The second capacity C2C_{2} is defined as the maximum transmission rate when random number generation is not allowed in an arbitrary intermediate node. Then, we have the following capacity theorem.

Theorem 10.1 ([19, Theorem 3])

We have the capacity formulas

C1=\displaystyle C_{1}= logqmin1jc(kjrj),\displaystyle\log q\min_{1\leq j\leq c}(k_{j}-r_{j}), (32)
C2=\displaystyle C_{2}= logqmin1jc(kjrj)(kj+1rj+1)(kcrc)kj+1kc.\displaystyle\log q\min_{1\leq j\leq c}(k_{j}-r_{j})\frac{(k_{j+1}-r_{j+1})\cdots(k_{c}-r_{c})}{k_{j+1}\cdots k_{c}}. (33)

Further, these capacities can be attained by non-local linear codes under the respective classes of non-local codes. \square

Further, the paper [19] showed that these capacities cannot be improved even when the attack is limited to deterministic and passive attacks. This fact shows that adaptive and active attacks cannot improve Eve’s ability in this network when we use the proposed code.

Here, we discuss the relation to existing results with respect to the difference between two capacities C1C_{1} and C2C_{2}. A larger part of preceding studies discuss the capacity C1C_{1}, i.e., the capacity (or capacity region) with no restriction of randomness generated at intermediate nodes. For example, as stated in Corollary 1, the equation C1=C2C_{1}=C_{2} holds in rr-wiretap network when mincut1=mincut2\mathop{\rm mincut}\nolimits_{1}=\mathop{\rm mincut}\nolimits_{2}. However, the paper [28] showed an example for network such that the capacity can be improved by randomness generated at intermediate nodes. In the example, only one edge connects the source node. This example seems natural because usually, the secure transmission can be done by use of the difference among information on different edges connected to the same node.

The papers [29, 30] addressed the difference between the existence and non-existence of randomness generated at intermediate nodes in another network only for deterministic attacks. But, these papers did not derive the capacities C1C_{1} and C2C_{2} exactly. because their analysis depends on special codes. Therefore, the analysis in [19] can be considered as the first derivation of the difference between the capacities C1C_{1} and C2C_{2} except for the case when only one edge connects the source node.

10.2 Ideas for proof

Since the proof of this theorem is too complicated, we omit the proof. Here, we simply explain what technical lemmas are employed for the proof. The converse part was shown by using the following lemma.

We denote the set {1,,k}\{1,\ldots,k\} by [k][k], and denote the collection of subsets S[k]S\subset[k] with cardinality rr by ([k]r){[k]\choose r}. Now, we consider the random variables X,Y1,,YkX,\vec{Y}_{1},\ldots,\vec{Y}_{k}. For an arbitrary subset S[k]S\subset[k], we denote the tuple of random variables (Ys)sS(\vec{Y}_{s})_{s\in S} by YS\vec{Y}_{S}. We can show the following two lemmas.

Lemma 4 ([20, (59)’])

We have

S([k]r)H(YS|X)\displaystyle\sum_{S\in{[k]\choose r}}H(\vec{Y}_{S}|X)\geq (k1r1)H(Y[k]|X)=rk(kkr)H(Y[k]|X).\displaystyle{k-1\choose r-1}H(\vec{Y}_{[k]}|X)=\frac{r}{k}{k\choose k-r}H(\vec{Y}_{[k]}|X). (34)

\square

Originally, the paper [19] stated a statement different from the above as Lemma 4. However, its derivation is not correct and was not used for the converse proof, as explained in [20]. Lemma 4 is the correct version, and is used in Eq. (47) in the converse part in [19]. Although Lemma 4 has been already known as Han’s inequality [31], it can be shown by Lemma 5 shown in [19], in the following way.

Here, we show Lemma 4 by using Lemma 5. Any element a[k]a\in[k] is contained in exactly (k1r1){k-1\choose r-1} members of ([k]r){[k]\choose r}. So, we apply Lemma 5 to the case with 𝒮h=([k]r){\cal S}_{h}={[k]\choose r} and h=(k1r1)h={k-1\choose r-1}. Thus, we have Eq. (34).

Lemma 5 ([19, Lemma 5])

Let 𝒮h{\cal S}_{h} be a collection of subsets of [k][k]. When an arbitrary element of [k][k] is contained in exactly hh members of 𝒮h{\cal S}_{h}, we have

S𝒮hH(YS|X)hH(Y[k]|X).\sum_{S\in{\cal S}_{h}}H(\vec{Y}_{S}|X)\geq hH(\vec{Y}_{[k]}|X). (35)

\square

In contrast, the direct part was shown by using the following technical lemma.

Lemma 6

For an arbitrary prime power qq, arbitrary two natural numbers k>rk>r, there exist a natural integer nk,rn_{k,r} and rr vectors v1,,vrqnk,rkv_{1},\ldots,v_{r}\in\mathbb{Z}_{q^{n_{k,r}}}^{k} such that vi,j=δi,jv_{i,j}=\delta_{i,j} for j=1,,mj=1,\ldots,m and the r×rr\times r matrix (vi,s(j))i,j(v_{i,s(j)})_{i,j} is invertible for an arbitrary injective function ss from {1,,r}\{1,\ldots,r\} to {1,,k}\{1,\ldots,k\}. \square

Lemma 6 has been shown in various topics, the wiretap channel II introduced by Ozarow and Wyner [32] and secret sharing [33, 34], etc. In the wiretap channel II model, a secret message is encoded to a codeword in an nk,rn_{k,r}-length code. A wiretapper can eavesdrop on arbitrary rr components out of kk parallel channels, but may have no information about the message. A linear code, e.g., a Reed-Solomon code can serve as the code. It is called a (k,r)(k,r) code for wiretap channel II, and satisfies the condition for Lemma 6. Also, such a code is called a maximum distance separable (MDS) code [35]. This lemma also can be regarded as a very simple and special case of the code in [2, Section III].

Since the network coding with local codes [26, 16] includes the wiretap channel II model as the case with parallel channels [36], it can be considered that the analysis [26, 16] contains a more general statement than Lemma 6.

Recently, this lemma was generalized to its symplectic version as Lemma 2 of [37]. The symplectic version is useful for analyzing the quantum version of private information retrieval. Also, the recent paper [38] generalized this lemma to various ways by using the concept of multi-target monotone span program (MMSP) to discuss various types of quantum extension of MDS codes.

11 Conclusion

We have reviewed several results under adaptive and active attacks over a one-hop relay network and unicast relay network. Also, we have reviewed the recent result for the difference between the existence and the non-existence of random number at intermediate nodes. These results show how to handle such unconventional attacks. Although the papers [17, 19] did not discuss the imperfect secrecy for an anti-Latin code under adaptive attacks, we have proved it in this paper. The paper [19] also generalized the result presented in Section 10 to a homogeneous multicast rely network. Although the review of this extension is omitted, the paper [19] presented a network code that works even with adaptive and active attack in these networks. However, the analysis on such unconventional attacks over a network is still limited. Further, it is desired to develop network codes for such unconventional attacks.

The paper [17] proposed the concept of an anti-Latin square, and no other paper discussed it. Based on Latin squares, the famous puzzle, Sudoku, has been invented and it has been enjoyed among many people. Since generating a pair of anti-Latin squares is not so trivial and is an interesting combinatorics problem, it can be expected to be developed into another puzzle. Also, it is expected that a more complicated combination of anti-Latin squares generates useful non-linear codes for more complicated network models. Although the decodability of an anti-Latin code is equivalent to (28), it is not clear whether this condition is equivalent to the condition that the map (Y1,Y2)(aY1,Y2,bY1,Y2)(Y_{1},Y_{2})\mapsto(a_{Y_{1},Y_{2}},b_{Y_{1},Y_{2}}) is one-to-one. That is, while the latter condition is its sufficient condition, its necessity is not clear. This problem is also an interesting open problem.

Finally, we propose other open problems. A subset SS of the set 𝒜(d){\cal A}(d) of d×dd\times d anti-Latin matrices is called mutual decodable when any two elements of SS form a decodable anti-Latin code. A subset S𝒜(d)S\subset{\cal A}(d) is called mutual one-to-one when the map (Y1,Y2)(aY1,Y2,bY1,Y2)(Y_{1},Y_{2})\mapsto(a_{Y_{1},Y_{2}},b_{Y_{1},Y_{2}}) is one-to-one for any two elements (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}) of SS. Then, we define two numbers A(d)A(d) and B(d)B(d) as

A(d)\displaystyle A(d) :=maxS:𝒜(d){|S|:S is mutual decodable.}\displaystyle:=\max_{S:\subset{\cal A}(d)}\{|S|:S\hbox{ is mutual decodable.}\} (36)
B(d)\displaystyle B(d) :=maxS:𝒜(d){|S|:S is mutual one-to-one.}\displaystyle:=\max_{S:\subset{\cal A}(d)}\{|S|:S\hbox{ is mutual one-to-one.}\} (37)

The calculations of these values are another interesting open problem. For Latin squares, a similar problem has been studied as follows. Two Latin squares (ai,j)(a_{i,j}) and (bi,j)(b_{i,j}) is called orthogonal when the map (i,j)(ai,j,bi,j)(i,j)\mapsto(a_{i,j},b_{i,j}) is one-to-one. It is known that the maximum size of a set of n×nn\times n mutually orthogonal Latin squares is n1n-1 when nn is a prime or prime power [39, 40]. The general case of this maximum number has been actively studied in the area of combinatorics [41].

Indeed, a mutual decodable subset S𝒜(d)S\subset{\cal A}(d) can be used to modify the one-hop relay network as follows. That is, the calculation of A(d)A(d) has the following operational meaning. We modify the one-hop relay network by putting |S||S| channels in the second step, and the code in the second step is defined by |S||S| anti-Latin matrices. In this case, we assume the following. Eve is allowed to eavesdrop one edge in the first group and another edge in the second group, adaptively. The receiver accesses only two edges in the second group and the two edges are selected randomly. In this situation, the above code based on a pairwise-decodable subset SS is imperfectly secret and decodable.

References

  • [1] N. Cai and R. Yeung, “Secure network coding,” Proc. 2002 IEEE Int. Symp. Information Theory (ISIT 2002), Lausanne, Swiss, July 2002, p. 323.
  • [2] N. Cai and R. W. Yeung, “Secure Network Coding on a Wiretap Network,” IEEE Trans. Inform. Theory, vol. 57, no. 1, 424 – 435 (2011).
  • [3] R. W. Yeung and N. Cai, “On the optimality of a construction of secure network codes,” Proc. 2008 IEEE Int. Symp. Information Theory (ISIT 2008), Toronto, ON, Canada, Jul. 6 – 11, 2008, pp. 166 – 170.
  • [4] T. Chan and A. Grant, “Capacity bounds for secure network coding,” Proc. Australian Commun. Theory Workshop, Christchurch, NZ, Jan. 30 – Feb. 1, 2008, pp. 95 – 100.
  • [5] S. El Rouayheb, E. Soljanin, and A. Sprintson, “Secure network coding for wiretap, networks of type II,” IEEE Trans. Inform. Theory, vol. 58, no. 3, pp. 1361 – 1371 (2012).
  • [6] J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, “On the capacity of secure network coding,” Proc. 42nd Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 29 – Oct. 1, 2004.
  • [7] C.-K. Ngai, R. W. Yeung, and Z. Zhang, “Network generalized hamming weight,” Proc. Workshop Network Coding Theory Appl., Lausanne, Switzerland, 2009, pp. 48 – 53.
  • [8] K. Harada and H. Yamamoto, “Strongly secure linear network coding,” IEICE Trans. Fund., vol. E91-A, no. 10, pp. 2720 – 2728 (2008).
  • [9] N. Cai, “Valuable messages and random outputs of channels in linear network coding,” Proc. 2009 IEEE Int. Symp. Information Theory (ISIT 2009), Seoul, Korea, Jun. 28 – Jul. 3, 2009, pp. 413 – 417.
  • [10] N. Cai and T. Chan, “Theory of Secure Network Coding,” Proceedings of the IEEE, vol. 99, no. 3, 421 – 437 (2011).
  • [11] D. Silva and F. R. Kschischang, “Universal Secure Network Coding via Rank-Metric Codes,” IEEE Trans. Inform. Theory, vol. 57, no. 2, 1124 – 1135 (2011).
  • [12] J. Kurihara, R. Matsumoto, and T. Uyematsu, “Relative generalized rank weight of linear codes and its applications to network coding,” IEEE Trans. Inform. Theory, vol. 61, no. 7, pp. 3912 – 3936 (2013).
  • [13] R. Matsumoto and M. Hayashi, “Secure Multiplex Network Coding,” 2011 International Symposium on Networking Coding (2011): DOI: 10.1109/ISNETCOD.2011.5979076.
  • [14] R. Matsumoto and M. Hayashi, “Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages,” IEEE Trans. Inform. Theory, vol. 63, no. 6, pp. 3773 – 3782 (2017).
  • [15] M. Hayashi, M. Owari, G. Kato, and N. Cai, “Secrecy and Robustness for Active Attack in Secure Network Coding,” Proc. 2017 IEEE Int. Symp. Information Theory (ISIT 2017), Aachen, Germany, June, 25 – 30, 2017, pp. 1172 – 1177.
  • [16] M. Hayashi and N. Cai, “Asymptotically Secure Network Code for Active Attacks” IEEE Transactions on Communications, vol. 69, no. 5, pp. 3245 – 3259 (2021).
  • [17] M. Hayashi and N. Cai, “Secure non-linear network code over one-hop relay network,” IEEE Journal on Selected Areas in Information Theory vol. 2, no. 1, pp. 296 – 305 (2021).
  • [18] M. Hayashi, M. Owari, G. Kato, and N. Cai, “Reduction Theorem for Secrecy over Linear Network Code for Active Attacks,” Entropy, Information Theory, Probability and Statistics Section, Special Issue: Multiuser Information Theory III, 22 (9), 1053 (2020).
  • [19] N. Cai and M. Hayashi, “Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes,” IEEE Trans. Inform. Theory, vol. 66, no. 3, pp. 1428 – 1448 (2020).
  • [20] N. Cai and M. Hayashi, “Corrections to “Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes” [Mar 20 1428-1448],” IEEE Trans. Inform. Theory, vol. 66, no. 6, pp. 3954 – 3954 (2020).
  • [21] J. Wu, G.-L. Long, and M. Hayashi, “Quantum secure direct communication with private dense coding using a general preshared quantum state,” Physical Review Applied, vol. 17, 064011 (2022).
  • [22] C.-H. F. Fung, X. Ma, and H. F. Chau, “Practical issues in quantum-key-distribution postprocessing,” Phys. Rev. A, vol. 81, 012318 (2010).
  • [23] M. Hayashi, “Quantum-inspired secure wireless communication protocol under spatial and local Gaussian noise assumptions,” IEEE Access, vol. 10, 29040-29068 (2022).
  • [24] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network Information Flow,” IEEE Trans. Inform. Theory, vol. 46, no. 4, 1204 – 1216, (2000).
  • [25] S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Trans. Inform. Theory, vol. 49, pp. 371 – 381, 2003.
  • [26] H. Yao, D. Silva, S. Jaggi, and M. Langberg, “Network Codes Resilient to Jamming and Eavesdropping,” IEEE/ACM Transactions on Networking, vol. 22, no. 6, 1978 - 1987 (2014).
  • [27] K. Bhattad, and K. R. Narayanan, “Weakly secure network coding,” 1st Workshop on Network Coding, Theory, and App., April 2005.
  • [28] N. Cai and R. W. Yeung, “A Security Condition for Multi-Source Linear Network Coding,” Proc. 2007 IEEE Int. Symp. Information Theory (ISIT 2007), Nice, France, June 2007, p. 561 – 565.
  • [29] T. Cui, T. Ho, and J. Kliewer, “Achievable strategies for general secure network coding,” Information Theory and Applications Workshop (ITA), 2010.
  • [30] T. Cui, T. Ho, and J. Kliewer, “On Secure Network Coding With Nonuniform or Restricted Wiretap Sets,” IEEE Trans. Inform. Theory, vol. 59, pp. 166 – 176, (2013).
  • [31] T. S. Han, “Nonnegative entropy measures of multivariate symmetric correlations,” Inform. Contr., vol. 36, no. 2, pp. 133 – 156, 1978.
  • [32] L. H. Ozarow and A. D. Wyner, “Wire-tap channel II,” AT& T Bell Labs. Tech. J., vol. 63, pp. 2135 – 2157, 1984.
  • [33] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612 -– 613, 1979.
  • [34] G. R. Blakley, “Safeguarding cryptographic keys,” Proc. Int. Workshop Manag. Requirement Knowl. (MARK), Jun. 1979, pp. 313–317.
  • [35] G. R. Blakley and G. A. Kabatianski, “Ideal perfect threshold schemes and MDS codes,” Proc. 1995 IEEE Int. Symp. Information Theory (ISIT 1995), Whistler, BC, Canada, September, 17 – 22, 1995, pp. 77843.
  • [36] Q. Zhang, S. Kadhe, M. Bakshi, S. Jaggi, and A. Sprintson, “Coding against a limited-view adversary: The effect of causality and feedback,” Proc. 2015 IEEE Int. Symp. Information Theory (ISIT 2015), Hong Kong, Jun. 2015, pp. 2530 -– 2534.
  • [37] S. Song and M. Hayashi, “Capacity of Quantum Private Information Retrieval with Colluding Servers,” IEEE Trans. Inform. Theory, vol. 67, no. 7, pp. 5491 – 5508 (2021).
  • [38] M. Hayashi and S. Song, “Unified Approach to Secret Sharing and Symmetric Private Information Retrieval With Colluding Servers in Quantum Systems,” IEEE Trans. Inform. Theory, vol. 69, no. 10, pp. 6537 – 6563 (2023).
  • [39] H. F. MacNeish, “Euler Squares,” Annals of Mathematics, vol. 23, no. 3, pp. 221-227 (1922).
  • [40] H. B. Mann, “The construction of orthogonal Latin squares,” Ann. Math. Statist. vol. 13 pp. 418-423 (1942).
  • [41] R. C. Bose and S. S. Shrikhande, “On the Construction of Sets of Mutually Orthogonal Latin Squares and the Falsity of a Conjecture of Euler,” Transactions of the American Mathematical Society, vol. 95, no. 2, pp. 191-209 (1960)