33email: [email protected]
Secure network coding with adaptive and active attack††thanks: Supported in part by the National Natural Science Foundation of China under Grant 62171212.
Abstract
Ning Cai and the author jointly studied secure network codes over adaptive and active attacks, which were rarely studied until these seminal papers. This paper reviews the result for secure network code over adaptive and active attacks. We focus on two typical network models, a one-hop relay network and a unicast relay network.
Keywords:
one-hop relay network unicast relay network non-linear code anti-Latin square.1 Introduction
Network coding is a key technology for communication over a network. Secure network coding protects our communication from various attacks. However, the majority of existing studies addressed deterministic and passive attacks, and did not care about the effect of adaptive changes on attacked edges and active modification on the information on attacked edge [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14]. The communication over a network has a risk that an adversary, Eve, can improve her ability by using adaptive and active operations. In several joint papers [15, 16, 17, 18, 19], Ning Cai and the author jointly studied how adaptive and active operations can improve Eve’s performance. This paper reviews these joint studies. Since the original paper [19] contains complicated descriptions and a certain error, this paper presents the corrected contents based on its correction [20]. In addition, the paper [19] discussed the difference between the existence and the non-existence of random number at intermediate nodes. Also, the paper [19] treated the correctness and the secrecy in an asymmetric way. In this paper, we adopt the base of the logarithm.
The outline of this paper is the following. This paper explains why such an asymmetric treatment is reasonable by citing the recent paper [21] in Section 2. Then, Section 2 introduces these two kinds of formulations based on the existence and the non-existence of random number at intermediate nodes. Section 3 analyzes -wiretap network based on the above mentioned formulations. Section 4 introduces two kinds of unconventional attack models, adaptive attack and active attack. Section 5 explains that secure communication is impossible in one-hop relay network under the non-existence of random number at intermediate nodes even when neither adaptive attack nor active attack is allowed for Eve. Section 6 introduces non-linear codes to resolve this problem. Section 8 shows adaptive attacks the above non-linear codes over one-hop relay network. Section 7 shows active attacks the above non-linear codes over one-hop relay network. Section 9 presents the usage of vector-linear code over one-hop relay network. Section 10 derives the capacities under adaptive and active attacks over unicast relay network. Section 11 makes conclusion.
2 Security model and coding model
Secure network coding has two kinds of security measures. One is the correctness of the decoding message, and the other is the secrecy of the transmitted message. Also, secure network coding considers the set of possible attacks. The usual setting requires the correctness and the secrecy when one of possible attack is done. However, when this requirement is imposed to our code, it is often difficult to realize a larger transmission rate. To realize a better transmission rate, it is possible to discount the requirement as follows. The discounted setting requires the secrecy when one of possible attack is done, but it requires the correctness only when no attack is made. This requirement is useful when the sender, Alice, and the receiver, Bob, share a small size of secret random number and they can use public channel due to the following reason.
As explained in [21], this discounted setting is reasonable as follows even for the message transmission. In this case, after the communication, Alice and Bob can apply error verification by using a small size of secret random number and public channel [21, Section VI], [22, Section VIII], [23, Section III-C-2)]. If an error is detected, they abort the protocol. Since the attack is limited to an element of the set of possible attacks, the requirement guarantees that the secrecy of the message is kept even in this case. Once the error verification is passed, the error verification guarantees the correctness. As explained in [21, Section VI], [22, Section VIII], [23, Section III-C-2)], when the size of the transmitted message is bits, the error verification consumes a polynomial amount of resources with respect to . Thus, the error verification does not affect the transmission rate of the whole protocol. Due to this reason, this paper focuses on the discounted setting.
This paper adopts two kinds of formulations for our codes depending on the resources on intermediate nodes. In the first formulation, an arbitrary node including an intermediate node can generate an arbitrary random number. In the second formulation, only the source node and the destination node can generate an arbitrary random number so that an intermediate node cannot. This paper adopts both formulations for our codes.
This paper considers two kinds of linear codes. When transmitted information on each edge in a code is given as a single element, i.e., a scalar, of a finite field or a quotient ring and a coding operation on each node is given as linear operations over input or incoming information, the code is called a scalar-linear code. When transmitted information on each edge in a code is given as a vector on a finite field or a quotient ring and a coding operation on each node is given as linear operations over input or incoming information, the code is called a vector-linear code. The paper [18] showed the following lemma.
3 Two kinds of formulations over single source and single terminal network model
To consider the relation between two kinds of formulations for our codes, we consider an acyclic network with a single source and a single terminal, where Eve is allowed to select an arbitrary -subset channels to access, which is called -wiretap network [1, 2, 24, 25]. We define the first capacity as the maximum transmission rate when random number generation is allowed in an arbitrary intermediate node. We define the second capacity as the maximum transmission rate when random number generation is not allowed in an arbitrary intermediate node. For our analysis on the capacities of the given network, we introduce two kinds of minimum cuts. A node is called a pseudo source node when the node has only outgoing edges but has no original message to be transmitted. Since a pseudo source node is not the source node nor the terminal node, it is classified as an intermediate node. The first kind of minimum cut is the minimum number of edges crossing a line separating the source and terminal nodes. The second kind of minimum cut is the minimum number of edges crossing a line separating the source and terminal nodes when we remove all edges outgoing from pseudo source nodes. Edges out-going from pseudo source nodes are counted in , but are not counted in .
Lemma 1 ([19, (35), (36), and Example 1])
For -wiretap network, we have
(1) | ||||
(2) |
As a special case analysis, we have the following corollary.
Corollary 1 ([19, Example 1])
When an -wiretap network has no pseudo source node, we have
(3) |
The network given in Fig. 1 shows that a network has different rates and . This network has a linear code to realize when , which implies the equality of the second inequality in (2). Since and , is strictly larger .

4 Unconventional attack models
This paper aims to discuss two unconventional types of attacks when the network model has a multiple-layer structure, like a one-hop relay network. When a one-hop relay network is given, a conventional type of attack is given as Fig. 4. One is an active attack as Fig. 4. In order to get more information, the eavesdropper changes the information on attacked edges. That is, after the above modification on the first attacked edge, the eavesdropper, Eve, may have a possibility to get more information via the second attack. Such an attack is called an active attack. If the attack is not an active attack, it is called a passive attack.
To discuss an active attack, we need to be careful for the causality and the time-ordering. The paper [18] carefully handled this problem, and showed the following theorem, which guarantees that an arbitrary active attack cannot improve Eve’s information when the code is linear.
Theorem 4.1 ([18, Theorem 1])
Suppose that coding operations on all nodes are linear. The information that Eve gets via an active attack on edges can be simulated by Eve by using the information that Eve gets via a passive attack on the same edges.
Although the paper [26] addressed a part of active attacks, its treatment is limited to a limited class of active attacks. The paper [16] covers a more general class of active attacks.
The second is an adaptive attack as Fig. 4. In order to get more information, Eve changes what edge is to be attacked according the information on the previous attacks. Such an attack is called an adaptive attack. If the attack is not an adaptive attack, it is called a deterministic attack. That is, a conventional attack is called a deterministic and passive attack.
![]() |
![]() |
![]() |
5 Problem over one-hop relay network
First, we consider a one-hop relay network as Fig. 4. This network has only one intermediate node in addition to the source node and the destination node. The intermediate node connects with the source node via two edges, i.e., two channels, and . Also, the intermediate node connects with the destination node via two edges, i.e., two channels, and . The aim of this network is the following. Alice intends to her message from the source node to Bob at the destination node. Here, we consider two types of attacks by an adversary, Eve. In the passive attack, Eve can eavesdrop on two edges in total, i.e., she can eavesdrop on one edge among and , and can another edge among and . In the active attack, Eve is allowed to change it to get more information.
Here, for the secrecy, we adopt imperfect secrecy as follows. When is the message and Eve’s information satisfies the condition for all of Eve’s possible attacks, the code is called perfectly secret. When the condition holds for all of Eve’s possible attacks, the code is called imperfectly secret [27] (or weakly secret). Otherwise, it is called insecure. In other words, our code is imperfectly secret, when there exists no function such that . Also, we say that the code is perfectly secret, when is Eve’s information and for all Eve’s possible attacks.
We choose as the uniform scramble random variable generated at the source node. Suppose that the intermediate node generates another uniform scramble random variable . We introduce a scalar-linear code as follows.
(4) |
Then, the intermediate node applies the code as
(5) |
The decoder is written as , which equals . This code satisfies the correctness. The pair is independent of . Similarly, the pairs , , and are independent of . Thus, this code is perfectly secret for passive attacks, and has the transmission rate .
Even when Eve selects the attacked edge or based on the observation on the first attack, Eve gets no information for the message . Hence, this code is secret even for an adaptive attack. Due to the linearity, even when Eve changes the information on the first attacked edge, Eve cannot improve her performance due to Theorem 4.1. Thus, this code is secret even for an adaptive and active attack.
However, when the intermediate node cannot generate a uniform scramble random variable, no scalar-linear code is imperfectly secret over a quotient ring for passive attacks, as shown in [17, Theorem 1]. In other words, for an arbitrary scalar-linear code over a quotient ring , Eve has a passive attack to recover the message perfectly.
6 Non-linear codes over one-hop relay network
To realize imperfect secrecy without random number generation on the intermediate node, we introduce the following non-linear code. For simplicity, it is assumed that Alice transmits only the message and an arbitrary edge can transmit only one binary information. We consider the following code, which requires the binary uniform scramble random variable at the source node.
The encoder is given in the same way as (4). Then, our non-linear code in the intermediate node is given as
(6) |
The decoder is given as . In this code, and have the following form;
(7) |
Thus, the decoder recovers as nevertheless the value of . We call the above code the standard non-linear code.
Consider the case when Eve eavesdrops in the first step. Suppose that Eve eavesdrops in the second step. When is invertible, she can recover by . But, when is not invertible, she cannot recover because the map is not one-to-one. Suppose that Eve eavesdrops in the second step When is invertible, she can recover by . But, when is not invertible, she cannot recover because the map is not one-to-one.
Consider the case when Eve eavesdrops in the first step. Suppose that Eve eavesdrops in the second step. To recover , she needs to find to satisfy . However, the map is not always one-to-one. For example, when and , is always zero. Also, when and , has the same value with . Thus, Eve cannot recover the original information . Suppose that Eve eavesdrops in the second step. To recover , she needs to find to satisfy . Similarly, the map is not always one-to-one. For example, when and , is always zero. Also, when and , has the same value with . In this way, we find that this code is imperfectly secret for deterministic and passive attacks. That is, there exists a secret code over deterministic and passive attacks.
When , The reference [17, Appendix] calculated the mutual information, i.e., the amount of information leakage as follows.
(8) |
Further, as shown in Lemma 2 with , when Eve cannot recover the message perfectly with an arbitrary deterministic and passive attack in the code, the network code is limited to the standard non-linear code or a code equivalent to the standard non-linear code.
Lemma 2 ([17, Lemma 1])
Suppose that and a code satisfies the following conditions. Let and be the random variables generated by the encoder when is subject to the uniform distribution. We assume that the random variables satisfies the following conditions.
- (C1)
-
The relation holds.
- (C2)
-
There is no deterministic function from to satisfying one of the following conditions.
(9) (10)
Then, there exist single-input functions on such that and satisfy (6) and (4) with a scramble random variable while the variable might be correlated with .
However, the above theorem does not holds when . In this case, the paper [17] proposed another non-linear code. For this aim, the paper [17] introduced an anti-Latin square. A matrix on is called an anti-Latin square when each row and each column have duplicate elements, which is the opposite requirement to a Latin square. For example, the following shows and anti-Latin square matrices.
(25) |
Using a pair of anti-Latin square matrices and , the paper [17] proposed a non-linear code as follows. The encoder is given in the same way as (4). Then, our non-linear code in the intermediate node is given as
(26) |
We call the above code the anti-Latin code of the pair of anti-Latin square matrices and .
For example, when the pair and is chosen by the first and second matrices (or the the third and fourth matrices) in (25), the map is one-to-one. So, the anti-Latin code is uniquely decodable. To see the equivalent condition to the unique decodability, we define the set
(27) |
When and , the set expresses the possible values of . Hence, the unique decodability is equivalent to the relation
(28) |
Although there is no decodable anti-Latin code for , a decodable anti-Latin code exists for as follows.
Lemma 3 ([17, Section V])
For , there exists a pair of anti-Latin square matrices and such that its anti-Latin code is decodable.
7 Active attack to non-linear code over one-hop relay network
Next, we consider active attacks over a one-hop relay network, as Fig. 4. Eve has the following two active attacks for the standard non-linear code.
- (i)
-
When Eve attacks on and replaces by , we have .
- (ii)
-
When Eve attacks on and replaces by , we have .
Therefore, the code presented in Section 8 is insecure under active attacks.
Since Lemma 2 guarantees the non-existence of another imperfectly secret code over deterministic and passive attacks for , the above discussion shows the non-existence of an imperfectly secret code over active attacks for .
However, Lemma 2 does not hold for . In fact, any anti-Latin code is imperfectly secret even under active attacks as follows. Assume that Eve eavesdrops and . Even when Eve replaces by any value, any row vector of has duplicate elements. Hence, Eve has a possibility that she cannot recover the message from and . The same discussion can be applied to other pairs of edges eavesdropped by Eve.
8 Adaptive attack to non-linear code over one-hop relay network
Next, we discuss adaptive attacks over one-hop relay network even when active modification is not allowed. Eve has the following adaptive attack to recover the message , as Fig. 4.
- (i)
-
First, Eve eavesdrops . When , she eavesdrops , and recovers as . When , she eavesdrops , and recovers as .
Thus, the non-linear code given in Section 6 is not imperfectly secret for adaptive attacks. Since Lemma 2 guarantees the non-existence of another imperfectly secret code over deterministic and passive attacks for , there exists no imperfectly secure code over adaptive attacks in this network model with . This fact shows that an adaptive attack is powerful for this kind of non-linear code with even when it has no active modification. In fact, when , Eve also has the following adaptive attack to recover the message .
- (ii)
-
First, Eve eavesdrops . When , she eavesdrops and recovers as . When , she eavesdrops and recovers as .
However, Lemma 2 does not hold for . In fact, any anti-Latin code is imperfectly secret even under adaptive and active attacks as follows. Assume that Eve eavesdrops at the first step. Even when Eve replaces by any value, any row vector of and any row vector of have duplicate elements. When Eve observes such duplicate elements in the second observation, she cannot recover the message . Hence, whichever or Eve eavesdrops in the second step, she has a possibility that she cannot recover the message from her observed information. The same discussion can be applied to the case when Eve eavesdrops by considering column vectors of and . Therefore, there exists an imperfectly secret code for under adaptive and active attacks when .
The discussion of this section is based on the paper [19]. But, it did not discuss adaptive attacks for anti-Latin codes.
9 Vector-linear codes over one-hop relay network
To resolve this problem, we employ a vector-linear code. A vector-linear code can be realized when the network of Fig. 4 is used at least twice. Suppose that the source node generates three uniform scramble random variables . Using these variables, we define a vector-linear code as follows. The first transmission sends the following;
(29) |
and the second transmission sends the following;
(30) |
Then, the intermediate node applies the code as
(31) |
In this code, nothing is transmitted in the second layer at the second transmission. The decoder is given as , which equals . Then, the pair is independent of . Similarly, the pairs , , and are independent of . Thus, this code is perfectly secret for deterministic attacks, and has the transmission rate . In the same reason as the above, this code is secret for adaptive attack. Then, due to the linearity, it is secure even for active and adaptive attacks.
The discussion until this section is summarized as Table 1.
Code | deterministic | active | adaptive |
---|---|---|---|
and passive | attack | attack | |
attack | |||
scalar-linear code over | insecure | insecure | insecure |
scalar-non-linear code over | imperfectly | insecure | insecure |
secret | |||
scalar-non-linear code | imperfectly | imperfectly | imperfectly |
over with | secret | secret | secret |
vector-linear code over | perfectly | perfectly | perfectly |
secret | secret | secret |
10 Non-local linear codes over unicast relay network
10.1 Capacity formula
The above type of codes can be generalized over unicast relay network. Before the detailed discussions, we remark on the relation between two kinds of linear codes over multiple uses of a given network. When coding operations on intermediate nodes are fixed to linear operations, such a model is called a linear network model. In this case, we have the freedom to design only coding operations in the source and destination nodes. Such coding operations are called an encoder and a decoder. Thus, operations at intermediate nodes are not designed. Such a code is called a local code, and was studied in the papers [19]. However, the code presented in Section 7 is not classified to this class of codes. In contrast, when all operations at intermediate nodes are designed to achieve a higher transmission rate, such a code is called a non-local code.

In the following, we consider non-local codes over a unicast relay network given as Fig. 5. But, for simple discussion, we assume that each edge sends one element of a finite field instead of an element of for a single channel use. A unicast relay network is composed of the following group structure of the intermediate nodes. This network has intermediate nodes, which are labeled from the first intermediate node to the -th intermediate node. It has only one source node and one terminal node, which are regarded as the -th node and the -th node, respectively. Each intermediate node has incoming edges and outgoing edges. For , this network has edges between the and -th nodes. At one channel use, each edge transmits the information for and that takes values on .
In this model, it is assumed that Eve eavesdrops edges among edges between the and -th nodes. Under this notation, the function expresses the edges eavesdropped by Eve. In other words, she can eavesdrop edges totally. Eve is allowed to make adaptive and active attacks, which are stronger attacks than conventional attacks.
The first capacity is defined as the maximum transmission rate when random number generation is allowed in an arbitrary intermediate node. The second capacity is defined as the maximum transmission rate when random number generation is not allowed in an arbitrary intermediate node. Then, we have the following capacity theorem.
Theorem 10.1 ([19, Theorem 3])
We have the capacity formulas
(32) | ||||
(33) |
Further, these capacities can be attained by non-local linear codes under the respective classes of non-local codes.
Further, the paper [19] showed that these capacities cannot be improved even when the attack is limited to deterministic and passive attacks. This fact shows that adaptive and active attacks cannot improve Eve’s ability in this network when we use the proposed code.
Here, we discuss the relation to existing results with respect to the difference between two capacities and . A larger part of preceding studies discuss the capacity , i.e., the capacity (or capacity region) with no restriction of randomness generated at intermediate nodes. For example, as stated in Corollary 1, the equation holds in -wiretap network when . However, the paper [28] showed an example for network such that the capacity can be improved by randomness generated at intermediate nodes. In the example, only one edge connects the source node. This example seems natural because usually, the secure transmission can be done by use of the difference among information on different edges connected to the same node.
The papers [29, 30] addressed the difference between the existence and non-existence of randomness generated at intermediate nodes in another network only for deterministic attacks. But, these papers did not derive the capacities and exactly. because their analysis depends on special codes. Therefore, the analysis in [19] can be considered as the first derivation of the difference between the capacities and except for the case when only one edge connects the source node.
10.2 Ideas for proof
Since the proof of this theorem is too complicated, we omit the proof. Here, we simply explain what technical lemmas are employed for the proof. The converse part was shown by using the following lemma.
We denote the set by , and denote the collection of subsets with cardinality by . Now, we consider the random variables . For an arbitrary subset , we denote the tuple of random variables by . We can show the following two lemmas.
Lemma 4 ([20, (59)’])
We have
(34) |
Originally, the paper [19] stated a statement different from the above as Lemma 4. However, its derivation is not correct and was not used for the converse proof, as explained in [20]. Lemma 4 is the correct version, and is used in Eq. (47) in the converse part in [19]. Although Lemma 4 has been already known as Han’s inequality [31], it can be shown by Lemma 5 shown in [19], in the following way.
Here, we show Lemma 4 by using Lemma 5. Any element is contained in exactly members of . So, we apply Lemma 5 to the case with and . Thus, we have Eq. (34).
Lemma 5 ([19, Lemma 5])
Let be a collection of subsets of . When an arbitrary element of is contained in exactly members of , we have
(35) |
In contrast, the direct part was shown by using the following technical lemma.
Lemma 6
For an arbitrary prime power , arbitrary two natural numbers , there exist a natural integer and vectors such that for and the matrix is invertible for an arbitrary injective function from to .
Lemma 6 has been shown in various topics, the wiretap channel II introduced by Ozarow and Wyner [32] and secret sharing [33, 34], etc. In the wiretap channel II model, a secret message is encoded to a codeword in an -length code. A wiretapper can eavesdrop on arbitrary components out of parallel channels, but may have no information about the message. A linear code, e.g., a Reed-Solomon code can serve as the code. It is called a code for wiretap channel II, and satisfies the condition for Lemma 6. Also, such a code is called a maximum distance separable (MDS) code [35]. This lemma also can be regarded as a very simple and special case of the code in [2, Section III].
Since the network coding with local codes [26, 16] includes the wiretap channel II model as the case with parallel channels [36], it can be considered that the analysis [26, 16] contains a more general statement than Lemma 6.
Recently, this lemma was generalized to its symplectic version as Lemma 2 of [37]. The symplectic version is useful for analyzing the quantum version of private information retrieval. Also, the recent paper [38] generalized this lemma to various ways by using the concept of multi-target monotone span program (MMSP) to discuss various types of quantum extension of MDS codes.
11 Conclusion
We have reviewed several results under adaptive and active attacks over a one-hop relay network and unicast relay network. Also, we have reviewed the recent result for the difference between the existence and the non-existence of random number at intermediate nodes. These results show how to handle such unconventional attacks. Although the papers [17, 19] did not discuss the imperfect secrecy for an anti-Latin code under adaptive attacks, we have proved it in this paper. The paper [19] also generalized the result presented in Section 10 to a homogeneous multicast rely network. Although the review of this extension is omitted, the paper [19] presented a network code that works even with adaptive and active attack in these networks. However, the analysis on such unconventional attacks over a network is still limited. Further, it is desired to develop network codes for such unconventional attacks.
The paper [17] proposed the concept of an anti-Latin square, and no other paper discussed it. Based on Latin squares, the famous puzzle, Sudoku, has been invented and it has been enjoyed among many people. Since generating a pair of anti-Latin squares is not so trivial and is an interesting combinatorics problem, it can be expected to be developed into another puzzle. Also, it is expected that a more complicated combination of anti-Latin squares generates useful non-linear codes for more complicated network models. Although the decodability of an anti-Latin code is equivalent to (28), it is not clear whether this condition is equivalent to the condition that the map is one-to-one. That is, while the latter condition is its sufficient condition, its necessity is not clear. This problem is also an interesting open problem.
Finally, we propose other open problems. A subset of the set of anti-Latin matrices is called mutual decodable when any two elements of form a decodable anti-Latin code. A subset is called mutual one-to-one when the map is one-to-one for any two elements and of . Then, we define two numbers and as
(36) | ||||
(37) |
The calculations of these values are another interesting open problem. For Latin squares, a similar problem has been studied as follows. Two Latin squares and is called orthogonal when the map is one-to-one. It is known that the maximum size of a set of mutually orthogonal Latin squares is when is a prime or prime power [39, 40]. The general case of this maximum number has been actively studied in the area of combinatorics [41].
Indeed, a mutual decodable subset can be used to modify the one-hop relay network as follows. That is, the calculation of has the following operational meaning. We modify the one-hop relay network by putting channels in the second step, and the code in the second step is defined by anti-Latin matrices. In this case, we assume the following. Eve is allowed to eavesdrop one edge in the first group and another edge in the second group, adaptively. The receiver accesses only two edges in the second group and the two edges are selected randomly. In this situation, the above code based on a pairwise-decodable subset is imperfectly secret and decodable.
References
- [1] N. Cai and R. Yeung, “Secure network coding,” Proc. 2002 IEEE Int. Symp. Information Theory (ISIT 2002), Lausanne, Swiss, July 2002, p. 323.
- [2] N. Cai and R. W. Yeung, “Secure Network Coding on a Wiretap Network,” IEEE Trans. Inform. Theory, vol. 57, no. 1, 424 – 435 (2011).
- [3] R. W. Yeung and N. Cai, “On the optimality of a construction of secure network codes,” Proc. 2008 IEEE Int. Symp. Information Theory (ISIT 2008), Toronto, ON, Canada, Jul. 6 – 11, 2008, pp. 166 – 170.
- [4] T. Chan and A. Grant, “Capacity bounds for secure network coding,” Proc. Australian Commun. Theory Workshop, Christchurch, NZ, Jan. 30 – Feb. 1, 2008, pp. 95 – 100.
- [5] S. El Rouayheb, E. Soljanin, and A. Sprintson, “Secure network coding for wiretap, networks of type II,” IEEE Trans. Inform. Theory, vol. 58, no. 3, pp. 1361 – 1371 (2012).
- [6] J. Feldman, T. Malkin, C. Stein, and R. A. Servedio, “On the capacity of secure network coding,” Proc. 42nd Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, Sep. 29 – Oct. 1, 2004.
- [7] C.-K. Ngai, R. W. Yeung, and Z. Zhang, “Network generalized hamming weight,” Proc. Workshop Network Coding Theory Appl., Lausanne, Switzerland, 2009, pp. 48 – 53.
- [8] K. Harada and H. Yamamoto, “Strongly secure linear network coding,” IEICE Trans. Fund., vol. E91-A, no. 10, pp. 2720 – 2728 (2008).
- [9] N. Cai, “Valuable messages and random outputs of channels in linear network coding,” Proc. 2009 IEEE Int. Symp. Information Theory (ISIT 2009), Seoul, Korea, Jun. 28 – Jul. 3, 2009, pp. 413 – 417.
- [10] N. Cai and T. Chan, “Theory of Secure Network Coding,” Proceedings of the IEEE, vol. 99, no. 3, 421 – 437 (2011).
- [11] D. Silva and F. R. Kschischang, “Universal Secure Network Coding via Rank-Metric Codes,” IEEE Trans. Inform. Theory, vol. 57, no. 2, 1124 – 1135 (2011).
- [12] J. Kurihara, R. Matsumoto, and T. Uyematsu, “Relative generalized rank weight of linear codes and its applications to network coding,” IEEE Trans. Inform. Theory, vol. 61, no. 7, pp. 3912 – 3936 (2013).
- [13] R. Matsumoto and M. Hayashi, “Secure Multiplex Network Coding,” 2011 International Symposium on Networking Coding (2011): DOI: 10.1109/ISNETCOD.2011.5979076.
- [14] R. Matsumoto and M. Hayashi, “Universal Secure Multiplex Network Coding with Dependent and Non-Uniform Messages,” IEEE Trans. Inform. Theory, vol. 63, no. 6, pp. 3773 – 3782 (2017).
- [15] M. Hayashi, M. Owari, G. Kato, and N. Cai, “Secrecy and Robustness for Active Attack in Secure Network Coding,” Proc. 2017 IEEE Int. Symp. Information Theory (ISIT 2017), Aachen, Germany, June, 25 – 30, 2017, pp. 1172 – 1177.
- [16] M. Hayashi and N. Cai, “Asymptotically Secure Network Code for Active Attacks” IEEE Transactions on Communications, vol. 69, no. 5, pp. 3245 – 3259 (2021).
- [17] M. Hayashi and N. Cai, “Secure non-linear network code over one-hop relay network,” IEEE Journal on Selected Areas in Information Theory vol. 2, no. 1, pp. 296 – 305 (2021).
- [18] M. Hayashi, M. Owari, G. Kato, and N. Cai, “Reduction Theorem for Secrecy over Linear Network Code for Active Attacks,” Entropy, Information Theory, Probability and Statistics Section, Special Issue: Multiuser Information Theory III, 22 (9), 1053 (2020).
- [19] N. Cai and M. Hayashi, “Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes,” IEEE Trans. Inform. Theory, vol. 66, no. 3, pp. 1428 – 1448 (2020).
- [20] N. Cai and M. Hayashi, “Corrections to “Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes” [Mar 20 1428-1448],” IEEE Trans. Inform. Theory, vol. 66, no. 6, pp. 3954 – 3954 (2020).
- [21] J. Wu, G.-L. Long, and M. Hayashi, “Quantum secure direct communication with private dense coding using a general preshared quantum state,” Physical Review Applied, vol. 17, 064011 (2022).
- [22] C.-H. F. Fung, X. Ma, and H. F. Chau, “Practical issues in quantum-key-distribution postprocessing,” Phys. Rev. A, vol. 81, 012318 (2010).
- [23] M. Hayashi, “Quantum-inspired secure wireless communication protocol under spatial and local Gaussian noise assumptions,” IEEE Access, vol. 10, 29040-29068 (2022).
- [24] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network Information Flow,” IEEE Trans. Inform. Theory, vol. 46, no. 4, 1204 – 1216, (2000).
- [25] S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Trans. Inform. Theory, vol. 49, pp. 371 – 381, 2003.
- [26] H. Yao, D. Silva, S. Jaggi, and M. Langberg, “Network Codes Resilient to Jamming and Eavesdropping,” IEEE/ACM Transactions on Networking, vol. 22, no. 6, 1978 - 1987 (2014).
- [27] K. Bhattad, and K. R. Narayanan, “Weakly secure network coding,” 1st Workshop on Network Coding, Theory, and App., April 2005.
- [28] N. Cai and R. W. Yeung, “A Security Condition for Multi-Source Linear Network Coding,” Proc. 2007 IEEE Int. Symp. Information Theory (ISIT 2007), Nice, France, June 2007, p. 561 – 565.
- [29] T. Cui, T. Ho, and J. Kliewer, “Achievable strategies for general secure network coding,” Information Theory and Applications Workshop (ITA), 2010.
- [30] T. Cui, T. Ho, and J. Kliewer, “On Secure Network Coding With Nonuniform or Restricted Wiretap Sets,” IEEE Trans. Inform. Theory, vol. 59, pp. 166 – 176, (2013).
- [31] T. S. Han, “Nonnegative entropy measures of multivariate symmetric correlations,” Inform. Contr., vol. 36, no. 2, pp. 133 – 156, 1978.
- [32] L. H. Ozarow and A. D. Wyner, “Wire-tap channel II,” AT& T Bell Labs. Tech. J., vol. 63, pp. 2135 – 2157, 1984.
- [33] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612 -– 613, 1979.
- [34] G. R. Blakley, “Safeguarding cryptographic keys,” Proc. Int. Workshop Manag. Requirement Knowl. (MARK), Jun. 1979, pp. 313–317.
- [35] G. R. Blakley and G. A. Kabatianski, “Ideal perfect threshold schemes and MDS codes,” Proc. 1995 IEEE Int. Symp. Information Theory (ISIT 1995), Whistler, BC, Canada, September, 17 – 22, 1995, pp. 77843.
- [36] Q. Zhang, S. Kadhe, M. Bakshi, S. Jaggi, and A. Sprintson, “Coding against a limited-view adversary: The effect of causality and feedback,” Proc. 2015 IEEE Int. Symp. Information Theory (ISIT 2015), Hong Kong, Jun. 2015, pp. 2530 -– 2534.
- [37] S. Song and M. Hayashi, “Capacity of Quantum Private Information Retrieval with Colluding Servers,” IEEE Trans. Inform. Theory, vol. 67, no. 7, pp. 5491 – 5508 (2021).
- [38] M. Hayashi and S. Song, “Unified Approach to Secret Sharing and Symmetric Private Information Retrieval With Colluding Servers in Quantum Systems,” IEEE Trans. Inform. Theory, vol. 69, no. 10, pp. 6537 – 6563 (2023).
- [39] H. F. MacNeish, “Euler Squares,” Annals of Mathematics, vol. 23, no. 3, pp. 221-227 (1922).
- [40] H. B. Mann, “The construction of orthogonal Latin squares,” Ann. Math. Statist. vol. 13 pp. 418-423 (1942).
- [41] R. C. Bose and S. S. Shrikhande, “On the Construction of Sets of Mutually Orthogonal Latin Squares and the Falsity of a Conjecture of Euler,” Transactions of the American Mathematical Society, vol. 95, no. 2, pp. 191-209 (1960)