This paper considers multiple unicast wireline noiseless networks where a single source wishes to transmit independent messages to a set of legitimate destinations. The primal goal is to characterize the secure capacity region, where the exchanged messages have to be secured from a passive external eavesdropper that has unbounded computational capabilities, but limited network presence. The secure capacity region for the case of two destinations is characterized and it is shown to be a function of only the min-cut capacities and the number of edges the eavesdropper wiretaps. A polynomial-time two-phase scheme is then designed for a general number of destinations and its achievable secure rate region is derived. It is shown that the secure capacity result for the two destinations case is not reversible, that is, by switching the role of the source and destinations and by reversing the directions of the edges, the secure capacity region changes.
|Original language||English (US)|
|Title of host publication||Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings|
|Number of pages||20|
|State||Published - 2017|
|Event||10th International Conference on Information Theoretic Security, ICITS 2017 - Hong Kong, Hong Kong|
Duration: Nov 29 2017 → Dec 2 2017
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Other||10th International Conference on Information Theoretic Security, ICITS 2017|
|Period||11/29/17 → 12/2/17|
Bibliographical noteFunding Information:
The work of the authors was partially funded by NSF under awards 1321120 and 1740047. G. K. Agarwal is also supported by the Guru Krupa Fellowship.