用户名: 密码: 验证码:
网络编码的编码复杂性和算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
2000年,Ahlswede等人从信息论角度创造性地提出“网络编码”这一新概念,首次将网络和路由有机融合为一体,建立了一种全新的网络体系结构.不同于传统信息传输方法,通过网络编码可以将传输过程中的信息流再次进行压缩,从而解决了多播网络传输中Shannon信息论上界不可达的问题.
     网络编码彻底改变了现有通信中信息处理和传输模式,是信息论研究领域的重大突破,已经引起了学术界和工程界的高度重视。目前,网络编码理论研究有如下几个重要问题:一是网络编码的编码复杂性问题.由于编码相对于路由转发操作更为复杂,因此需要尽可能的减少编码操作.特别是研究一个多播网络中需要编码操作的节点个数与网络结构之间的关系问题;二是网络编码的构造问题.如何用较低的复杂度构造网络编码是将其应用于现实网络通信中的重要一步.对于无环网络,已经存在多项式时间的网络编码算法,现存的算法复杂度是否可以进一步降低也是大家关注的重要问题.对于带环网络,主要集中在卷积网络算法的研究上.虽然已经有多项式时间的构造算法,但是复杂性还是较高,不利于程序化实现.如何进一步结合无环网络上的某些思想来构造带环网络上的网络编码是下一步研究的突破口;三是安全网络编码的构造问题.自从蔡宁和杨伟豪首次提出将网络编码用于安全通信的几年时间里,安全网络编码得到了蓬勃发展.特别是抗主动攻击(或称拜占庭攻击)的安全网络编码,不但引起了信息学专家的关注,也引起了密码学专家的关注.信息学专家从信息论的角度设计能够在信宿节点检测篡改的安全网络编码,但是这种办法对具体网络的限制较多,不利于实际应用.密码学专家用数字签名的方法给编码的消息进行签名,中间节点通过验证收到的消息是否为真来决定下一步的消息处理.虽然这些方法能够阻止错误消息的传播,但是它们的计算复杂度较高.因此,如何结合这两种方法设计新的安全网络编码是下一步研究的重点.
     本文针对上述问题进行了深入研究,获得了几个关键性的研究成果,主要概括为:
     1.通过为路着色和对网络的组合分解给出了无环多播网络上最少编码节点的最优解.在无环网络结果的基础上,作者进一步分析了带环网络上的最少编码节点个数,得到了较Langberg等人更优的结果.对于多播上网络编码的编码复杂性,Langberg等人虽然已经有了一些重要成果,但并没有完全解决编码节点个数问题,特别是带环网络上的编码节点个数问题.
     2.在得到无环多播网络上最少编码节点个数最优解的基础上,进一步分析了Langberg算法的计算复杂度,并得到了最好的结果.同时也对构造整型网络编码和分型网络编码的时间复杂度进行了重新分析.
     3.结合无环网络中的Jaggi-Sanders算法和控制论中的梅森公式设计了一种新的卷积网络编码算法.
     4.结合信息学和密码学理论,设计了一类可扩展的网络编码算法.一是防窃听的安全网络编码算法;二是拜占庭攻击检测的安全网络编码算法;三是前两种算法的结合算法,它即可以做到防窃听又可以做到拜占庭攻击检测.
In 2000, from the perspective of information theory Ahlswede et al. proposed a new concept "Network Coding" in a creative way. And it made network and routing as an organic integration at the first time and established new network architecture. Unlike the traditional mode of store-and-forward, the information transmitted on the network can be compressed again, and thus it possible to achieve the Shannon upper bound on the capacity of the multicast network
     Network coding completely change the existing mode of information processing and communication transmission, which is a major breakthrough in the field of information theory research. So it has attracted great attention of academia and engineering. Currently, network coding theory has the following several important questions:First, the encoding complexity of network coding. As the complexity of coding operations is higher than that of routing forwarding operation, it's better to have less coding operations as much as possible. It is important to study the relation between the minimal number of encoding nodes and the structure of network. Second, the constructions of network coding. How to construct network coding with low complexity is the first step to be applied in real networks. For the acyclic networks, there exist polynomial time encoding algorithms. Whether the existing algorithms can further reduce the complexity is an important issue we are concerned about. For the cyclic networks, the constructions of network coding are mainly concentrated on convolutional network coding. Although there exist polynomial-time algorithms, it is not conducive to realization. Especially compied the method used in acyclic networks to construct convolutional network codes for cyclic networks. Third, the constructions of secure network coding. Cai N. and Yeung R.W. proposed a scheme of secure network coding for secure communications. In a few years, the study on the secure network coding has flourished. In particular, the secure network coding against anti-active attack (or Byzantine attack) has not only attracted the attentions of the experts in informatics, but also cryptography experts. Informatics experts from the perspective of information theory design secure network coding to detect tampering at terminal nodes. But this means more restrictions on the network, so it is not conducive to practical application. The messages encoded by network coding are signed by digital signatures, and after receiving the messages intermediate nodes verify the truth of the messages and then determine the next operations. Although these methods can prevent the error messages from spreading, they have very high computational complexity. Therefore, how to combine these two approaches to design new secure network code is the next focus of the study.
     In this article, the author studies these issues in depth, and has several key research findings, mainly summarized as follows:
     1. Combine coloring theory and network decomposition we get the optimal solution for acyclic multicast network on the minimum number of encoding nodes. Based on the results for the acyclic networks, we further analysis the minimum number of encoding nodes in cyclic networks, and have a better result than that of Langberg's. For the encoding complexity of network coding in multicast, although Langberg et al. have had some important results, they do not completely solve the problem of the number of encoding nodes, particularly for the cyclic networks.
     2. Based on the new results of the minimal number of encoding nodes, we further analysis the Langberg algorithm and find that it complexity should be lower. Moreover, we reanalysis the time complexity of integral and fractional network codes.
     3. Combining Jaggi-Sanders algorithm and Mason formula in control theory we design a new algorithm for the construction of convolutional network code.
     4. Combining the methods used in information science and cryptography theory, we design a class of secure network coding. First, secure network coding against eavesdropping attacks; Second, secure network coding against Byzantine attacks; Third, the combination of the first two algorithms, which can be used against eavesdropping and Byzantine attacks.
引文
[1]Elias P., Feinstein A. and Shannon C. E., A note on the maximum flow through a network, IEEE Transactions on Information Theory,2,1956,17-119.
    [2]J.邦詹森,G古廷著,姚兵,张忠辅译,有向图的理论、算法及其应用,科学出版社.
    [3]Douglas B. West著,李建中骆吉洲译,图论导引,机械工业出版社,2006.
    [4]Yeung R.W. and Zhang Z., Distributed source coding for satellite communications. IEEE Transactions on Information Theory,45,1999, 1111-1120.
    [5]Ahlswede R., Cai N., Li S.-Y. R. et al., Network information flow. IEEE Transactions on Information Theory,46(4),2000,1204-1216.
    [6]Li S. Y. R., Yeung R. W. and Cai N., Linear Network Coding, IEEE Transactions on Information Theory,2,2003,1204-1216.
    [7]Cai K. and Fan P., An algebraic approach to link failures based on network coding, IEEE Transactions on Information Theory,53(2),2007,775-779.
    [8]Zhang J. Y., Fan P. Y., On network coding in wireless Ad Hoc networks,2nd International Conference on Mobile Technology, Applications and Systems,2005, 8.
    [9]Chang C., Ho T., Effros M:, M. Medard et al., Issues in Peer-to-Peer Networking: a Coding Optimization Approach, International Symposium on Network Coding, 2010.
    [10]A. Agarwal, M. Charikar, On the advantage of network coding for improving network throughput, IEEE Information Theory Workshop, Oct.2004,247-249.
    [II]Wu Y., Network coding for wireless networks, Microsoft Research,2007.
    [12]S. Bahadra, S. Shakkottai, P. Gupta, Min-cost selfish multicast with network coding,4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless networks, Apr.2006,1-8.
    [13]J. Barros, S. D. Servetto, A coding theorem for network information flow with correlated sources, IEEE International Symposium on Information Theory,2005, 147-151.
    [14]Ho T., M. Medard, et al., The benefits of coding over routing in a randomized setting, IEEE International Symposium on Information Theory,2003,442.
    [15]工静,刘景美,王新梅等,一种网络编码的多播路由算法,西安电子科技 大学学报(自然科学版),35(1),2008,71-75.
    [16]Cai N. and Yeung R. W., Secure network coding, Proc. IEEE International Symposium on Information Theory,2002,323.
    [17]Cai N. and Yeung R. W., A security condition for multicast-source linear network coding, IEEE Int. Symp. Info. Theory,2007.
    [18]K. Han, T. Ho, R. Koetter, M. Medard et al., On network coding for security, In IEEE MILCOM (2007).
    [19]Wei Yawen, Yu Zhen, Guan Yong, Efficient Weakly-Secure Network Coding Schemes against Wiretapping Attacks, IEEE International Symposium on Network Coding,2010,1-6.
    [20]Lima L., Gheorghiu S., Barros J., et al., Secure network coding for multi-resolution wireless video streaming, IEEE Journal on Selected Areas in Communications,28(3),2010,377-388.
    [21]Chi K. K., Wang X. M., Analysis of network error correction based on network coding,1EE Proceedings:Communications,152(4),2005.
    [22]Gkantsidis C., Rodriguez P., Cooperative security for network coding file distribution, IEEE International Conference on Computer Communication,2006, 1-13.
    [23]Cai N., Yeung R. W., Network coding and error correcting, IEEE Proceedings of the Information Theory Workshop,2002,119-122.
    [24]C. Fragouli, J. Widmer, J.-Y. Le Boudec, Efficient Broadcasting Using Network Coding, IEEE/ACM Transactions on Networking,16(2),2008,450-463.
    [25]Chou P. A., Lovasz L., Jain K., Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding, ACM Symposium on Principles of Distributed Computing, Las Vegas, NV,2005.
    [26]Wu Y, Chou P. A., Kung S-Y, Minimum-energy multicast in mobile ad hoc networks using network coding, IEEE Transactions on Communications,53(11), 2005,1906-1918.
    [27]Sengupta S., Rayanchu S., Banerjee S., Network Coding-Aware Routing in Wireless Networks, IEEE/ACM Transactions on Networking,18(4),2010,1158-1170.
    [28]Gkantsidis C., Rodriguez P. R., Network coding for large scale content distribution, Microsoft Research,2004.
    [29]Chi K., Yang C., Wang X., Performance of network coding based multicast, IEE Proceedings:Communications,153(3),2006,399-404.
    [30]Zhao J., Yang F., Zhang Q., et al., LION:layered overlay multicast with network coding, IEEE Transactions on Multimedia,8(5),2006,1021-1032.
    [31]Wang Mea, Li Baochun, Network Coding in Live Peer-to-Peer Streaming, IEEE Transactions on Multimedia,9(8),2007,1554-1567.
    [32]Ho T., Medard M., Koetter R., An information-theoretic view of network management, IEEE Transactions on Information Theory,51(4),2005,1295-1312.
    [33]Ho T., Leong B., Chang Y. H., et al., Network monitoring in multicast networks using network coding, IEEE International Symposium on Information Theory, 2005,1977-1981.
    [34]Chiu Yeung D. M., Huang J. Q., Fan B., Can network coding help in P2P networks, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2006,1-5.
    [35]Ho T., Medad M., Koetter R., A coding view of network recovery and management for single receiver communication, IEEE International Symposium on Information Theory,2002,137.
    [36]Tavory A., Feder M. and Ron D., Bounds on linear codes for network multicast, in Proc. Electronic Colloquium on Computational Complexity (ECCC),10,2003.
    [37]Wu Y, Jain K. and Kung S. Y, A unification of Menger's and Edmonds'graph theorems and Aslswede et al's network coding theorem, in Proc. Allerton Conf. Communications, Control and Computing, Monticello, IL, Oct.2004.
    [38]Menger K., Zur allgemeinen Kurventheorie, Fund. Math.,1980 vol.10, pp.95-115.
    [39]Edmonds J., Edge-disjoint branchings, Combinatorial Algorithms, ed. R. Rustin, Academic Press, NY,1973,91-96.
    [40]Fragouli C. and Soljanin E., Information Flow Decomposition for Network Coding, IEEE Trans. Inform. Theory,52(3),2006,829-847.
    [41]Fragouli C., Soljanin E., Subtree decomposition for network coding, IEEE International Symposium on Information Theory,2004,145.
    [42]Langberg M., Sprintson A. and Bruck J., The Encoding Complexity of Network Coding, IEEE Trans. Inform. Theory,52(6),2006,2386-2397.
    [43]Langberg M., Sprintson A. and Bruck J., Network Coding:A Computational Perspective, IEEE Trans. Inform. Theory,55(1),2009,147-157.
    [44]Lun D. S., Ratnakar N., Koetter R. et al, Achieving minimum-cost multicast:A decentralized approach based on network coding, Proc. IEEE INFOCOM,2005.
    [45]Lun D. S., Ratnakar N., Medard M. et al, Minimum-cost multicast over coded packet networks, IEEE Trans. Inform. Theory,52(6),2006,2608-2623.
    [46]Wu Y., Chou P. A. and Jain K., A comparison of network coding and tree packing, Proc.2004 Inter. Symp. on Infor. Theroy, Chicago,2004.
    [47]Lee A., Medard M., Haigh K. Z., et al, Minimum-cost subgraphs for joint distributed source and network coding, Proc.4th Workshop on Network Coding, Theory and Applications (NetCod), San Diego, California,2007.
    [48]Koetter R. and Medard M., An Algebraic Approach to Network Coding, IEEE/ACM Transactions on Networking,5,2003,782-795.
    [49]Jaggi S., Sanders P., Chou P. A., et al, Polynomial Time Algorithms for Multicast Network Code Construction, IEEE Trans. Inform. Theory,6,2005, 1973-1982.
    [50]Ho T., Medard M., Koetter R., et al, A random linear network coding approach to multicast, IEEE Trans. Inform. Theory,10,2006,4413-4430.
    [51]Fragouli C., Soljanin E., Decentralized network coding, IEEE Information Theory Workshop, Oct.2004,310-314.
    [52]Erez E. and Feder M., Convolutional Network Codes for Cyclic Networks, Proc. 1 st Workshop on Network Coding, Theory and Applications (NetCod), Riva del Garda, Italy,2005.
    [53]Erez E. and Feder M., Efficient Network Codes for Cyclic Networks, Inter. Sym. on Info. Theory,2005.
    [54]Barbero A. I. and Ytrehus O., Cycle-Logical Treatment for "Cyclopathic" Networks, IEEE Tans. Info. Theory,52,2006,2795-2804.
    [55]Fragouli C., Soljanin E., A connection between network coding and convolutional codes, IEEE International Conference on Communications,2004, 661-664.
    [56]Huang J. Q., Wang L., Cheng W. Q., et al., Polynomial time construction algorithm of BCNC for network coding in cyclic networks, The 8th IEEE/ACIS Inter. Conf. on Computer and Info. Science,2009.
    [57]Feldman J., Malkin T., Stein C., et al., On the capacity of secure network coding. 42nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL,2004.
    [58]Jain K., Security based on network topology against the wiretapping attacking, IEEE Wireless Comm.,11(1),2004,68-71.
    [59]Bhattad K. and Narayanan K. R., Weakly Secure Network Coding,1st Workshop on Network Coding, Theory and Applications (NetCod), Italy,2005.
    [60]Chan T. and Grant A., Capacity Bounds for Secure Network Coding, AusCTW 2008.
    [61]马松雅,罗明星,杨义先.抗Byzantine攻击的安全网络编码综述.中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会论文集.北京:国防工业出版社,2008.
    [62]Ho T., Medard M., Effros M., et al, Byzantine Modification Detection in Multicast Networks with Random Network Coding, IEEE Trans. Inform. Theory, 54(6),2008,2798-2803.
    [63]Jaggi S., Langberg M., Katti S., et al., Resilient Network Coding In the Presence of Byzantine Adversaries. IEEE INFOCOM 2007, Anchorage, AK,2007.
    [64]Krohn M., Freedman M. and Mazieres D., On the fly verification of rateless erasure codes for efficient content distribution, Proc. of IEEE Symposium on Security and Privacy,2004,226-240.
    [65]Zhao F., Kalker T., Medard M., et al., Signatures for content distribution with network coding, Proc. Intl. Symp. on Info. Theory (ISIT),2007.
    [66]Charles D., Jain K. and Lauter K., Signatures for network coding,40th Annual Conference on Information Sciences and Systems (CISS 06),2006.
    [67]Boneh D., Gentry C., Lynn B., et al, Aggregate and verifiably encrypted signatures from bilinear maps, In Advances in Cryptology-Eurocrypt, LNCS 2656, Springer,2003,416-432.
    [68]Jaggi S., Sanders P., Chou P. A., et al, Design and analysis of network codes, [Ph.D. Dissertation], California Institute of Technology,2006.
    [69]Petrovic D., Kannan R, Rabaey J. Coding for sensor networks using untuned radios, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications,2005,1093-1097.
    [70]Ahuja R. K., Magnanti T. L., Orlin J. B., Networks flows, Englewood Cliffs, NJ: Prentice-Hall,1993.
    [71]Yeung R. W., Li S.-Y. R., Cai N. et al, Network Coding Theory, Foundations and Trends in Comm. and Inf. Theory,2(4,5),2005,241-381.
    [72]Yeung R. W., Information Theory and Network Coding, Springer, New York, 2008,411-540.
    [73]Tan M., Yeung R. W. and Ho S. T., A Unified Framwork for the Linear Network Coding, Proc.4th Workshop on Network Coding, Theory and Applications (NetCod), Hong Kong,2008.
    [74]Li S. Y. R. and Ho S. T., Ring-theoretic foundation of convolutional network coding, Proc.4th Workshop on Network Coding, Theory and Applications (NetCod), Hong Kong,2008.
    [75]Li S.-Y.R., Sun Q.T., Network coding theory via commutative algebra, Network Coding, Theory, and Applications,2009,12-17.
    [76]Fragouli C., Soljanin E. and Shokrollahi A., Network coding as a coloring problem, in Proc. Conf. Information Sciences and Systems. Princeton, NJ,2004.
    [77]Ho T. and Lun D. S., Network Coding:An Introduction, Cambridge University Press, New York,2008.
    [78]Garey M. R. and Johnson D. S., Computers and Intractability, San Fancisco, CA: Freeman,1979.
    [79]Motwani R. and Raghavan P., Randomized Algorithms, Cambridge Univ. Press, Cambridge, U.K,1995.
    [80]J. Suurballe and R. Tarjan, A quick method for finding shortest pairs of disjoint paths, Networks,14,1984,325-336.
    [81]Bhattad K., Ratnakar N., Koetter R., Narayanan K. R., Minimal network coding for multicast, IEEE International Symposium Information Theory,2005, 1730-1734.
    [82]Barbero A. I. and Ytrehus O., An Efficient Centralized Bianary Multicast Network Coding Algorithm for Any Cyclic Network, http://arxiv.org/abs/0705.0085.
    [83]Mason S. J., Zimermann H. J., Electronic Circuits, Signals, and Systems, Wiley, New York,1960.
    [84]Zhou M. C., Wang C. H., Zhao X. Y., Automation Mason's Rule and Its Application to Analysis of Stochastic PetriNets, IEEE Transaction on Control Systems Thechnology,3,1995,238-244.
    [85]马洪明,梅森公式的程序设计,计算机辅助工程,3,1996,83-86.
    [86]Boneh D., Freeman D., Katz J. et al., Signing a Linear Subspace:Signature Schemes for Network Coding, PKC 2009, LNCS 5443,2009,68-87.
    [87]Lamport L., Shostak R. and Pease M., The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems,4(3),1982,382-401.
    [88]Tarjan R. E., A good algorithm for edge-disjoint branching, Information Processing Letters,1974,51-53.
    [89]Tong P., Lawler E. L., A faster algorithm for finding edge-disjoint branching, Information Processing Letters,1983,73-76.
    [90]Buzna L., Peters K., Helbing D., Modelling the dynamics of disaster spreading in networks, Physica A,363,2006,132-140.
    [91]Peters K., Buzna L., Helbing D., Modeling of cascading effects and efficient response to disaster spreading in complex networks, International Journal of Critical Infrastructure,4,2008,46-62.
    [92]BatageIj V., Brandes, U., Efficient generation of large random networks. Phys. Rev. E 71,2005,036113.
    [93]Grabowski A., Kosinski R.A., Epidemic spreading in a hierarchical social network, Physical Review E,70,2004,031908-031916.
    [94]Liu Z., Hu B.:Epidemic spreading in community networks. Europhysics Letters, 72,2005,315-321.
    [95]Huang W., Li C.G., Epidemic spreading in scale-free networks with community structure, Journal of Stat. Mech., P01014,2007.
    [96]Zhou Y., Liu Z. and Zhou J., Periodic wave of epidemic spreading in community networks, Chinese Physics Letters,24(2),2007,581-584.
    [97]Kosinski R.A., Grabowski A., Nonlinear model of epidemic spreading in a complex social network. Nonlinear Dynamics, Psychology, and Life Sciences,11, 2007,435-451.
    [98]Johson R., Molnar D., Song D. et al., Homomorphic signature schemes, topics in Cryptology CT-RSA LNCS 2271,2002,244-262.
    [99]Yeung R. W. and Cai N., Network error correction, part Ⅰ:Basic concepts and upper bounds, Communications in Information and Systems,2006.
    [100]Cai N. and Yeung R. W., Network error correction, part Ⅱ:Lower bounds, Communications in Information and Systems,2006.
    [101]Yang S. H., R. W. Yeung, Characterizations of Network Error Correction/Detection and Erasure Correction. Proc. Netcod,2007.
    [102]Danilo Silva, Frank R. Kschischang, et al., A Rank-Metric Approach to Error Control in Random Network Coding. IEEE Transactions on Information Theory, 2008,3951-3967.
    [103]Koetter R., Kschischang F. R., Coding for errors and erasures in random network coding [J]. Proc. IEEE International Sympsium on Information Theory, Nice, France,2007.
    [104]Zhang Z., Linear Network Error Correction Codes in Packet Networks. IEEE Transactions on Information Theroy,2008,209-218.
    [105]Rajawat K., Giannakis G B., Non-random Wireless Network Coding, IEEE Inter. Workshop on Sensor, Mesh and Ad Hoc Communications and Networks, 2009.
    [106]Fong S. L., Yeung R. W., Variable-rate linear network coding, IEEE Transactions on Information Theory,56(6),2010,2618-2625.
    [107]Goseling J., Weber J. H., Multi-rate network coding for minimum-cost multicasting, IEEE International Symposium on Information Theory,2008.
    [108]Vaidya P. M., An algorithm for linear programming which requires O(((m+n)n2+(m+n)15n)L) arithmetic operations, Math. Program,47(2),1990, 175-201.
    [109]Fortune S., Hopcroft J., Wyllie J., The directed subgraph homeomorphism problem, Theory Computer Science,10(2),1980,111-121.
    [110]Ebrahimi J., Fragouli C., Vector network coding algorithms, IEEE International Symposium on Information Theory (ISIT),2010,2408-2412.
    [111]Harvey N. J. A., Karger D. R., Murota K., Deterministic network coding by matrix completion, Proc. ACM-SIAM Symp. Discrete Algorithms,2005, 489-498.
    [112]Li Q., Chiu D.M., Lui J., On the Practical and Security Issues of Batch Content Distribution via Network Coding, Proceedings of International Conferences Network Protocols (ICNP),2006,158-167.
    [113]Yang S. H., Wu J., Efficient broadcasting using network coding and directional antennas in MANETs, IEEE Transactions on Parallel and Distributed Systems,21(2),2010,148-161.
    [114]Adeli M., Liu H. P., Secure network coding with minimum overhead based on hash functions, IEEE Communications Letters,13(2),2009,956-958.
    [115]Oliveira P. F., Barros J., A Network Coding Approach to Secret Key Distribution, IEEE Transactions on Information Forensics and Security,3(3), 2008,414-423.
    [116]Zhang Y., Xu C. Q., Wang F., A novel schemes for secure network coding using one-time pad, International Conference on Network Security, Wireless Communications and Trusted Computing,2009,92-98.
    [117]Rivest R. L., All-or-nothing encryption and the package transform, FSE 1997, LNCS 1267,1997,210-218.
    [118]Stinson D. R., Something about all or nothing (transforms), Designs, Codes and Cryptography,22 (2),2001,133-138.
    [119]Shin S. U., Shin W., Rhee K. H., All-or-nothing transform and remotely keyed encryption protocols, PKC 2000, LNCS 1751,2000,178-195.
    [120]Zhang Rui, Hanaoka G., Imai H., On the security of cryptosystems with All-or-Nothing transform,2nd International Conference on Applied Cryptography and Network Security, LNCS 2004,76-90.
    [121]Katti S., Shintre S., Jaggi S., et al., Real network codes,45th Annual Allerton Conference Allerton House, UIUC,2007,389-395.
    [122]罗明星,杨义先,王励成等,抗窃听的安全网络编码,中国科学F辑,40(2)2010,371-380.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700