Visible to the public "LP formulations for secrecy over erasure networks with feedback"Conflict Detection Enabled

Title"LP formulations for secrecy over erasure networks with feedback"
Publication TypeConference Paper
Year of Publication2015
AuthorsA. Papadopoulos, L. Czap, C. Fragouli
Conference Name2015 IEEE International Symposium on Information Theory (ISIT)
Date PublishedJune
ISBN Number978-1-4673-7704-1
Accession Number15506900
Keywordsarbitrary network, Automatic repeat request, Complexity theory, cryptography, Encryption, erasure network, feedback, Linear programming, LP formulation, message sending, network coding, polynomial time scheme, pubcrawl170102, secure message transmission, telecommunication channels, telecommunication security

We design polynomial time schemes for secure message transmission over arbitrary networks, in the presence of an eavesdropper, and where each edge corresponds to an erasure channel with public feedback. Our schemes are described through linear programming (LP) formulations, that explicitly select (possibly different) sets of paths for key-generation and message sending. Although our LPs are not always capacity-achieving, they outperform the best known alternatives in the literature, and extend to incorporate several interesting scenaria.

Citation Key7282596