Effectiveness Analysis of ALNCode Scheme for Anonymous Communication with Network Coding

نویسندگان

  • Yihui Zhou
  • Xuening Liao
  • Zhenqiang Wu
چکیده

Network coding provides a new perspective for anonymous communication. Wang et al. propose an anonymous communication scheme named ALNCode, in which the linear relation of the global encoding vectors can be hidden without the participation of encryption/decryption operations. But the effectiveness of the scheme needs to be further analyzed. In this paper, we present an exact formula of the effectiveness of ALNCode scheme, which goes a step further than the lower bound given by Wang et al.. Based on the exact formula, the influential factors of effectiveness of the scheme are taken into account in details. Moreover, a comparison between the exact effectiveness and the lower bound shows that the lower bound is not true. The reason of the error is analyzed finally.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Suitable Coding Scheme for Broadband Power-line Communication

This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Anonymous Coherent Network Coding Against Active Adversary

This paper considers a problem of anonymous transmission against eavesdropping and jamming in coherent network coding. A message of n packets is transmitted between some source-receiver pair. An adversary can eavesdrop arbitrary μ packets and inject no more then t malicious packets. The goal is to achieve a communication in such a manner that the adversary can not determine who communicates wit...

متن کامل

Optimal Coding Subgraph Selection under Survivability Constraint

Nowadays communication networks have become an essential and inevitable part of human life. Hence, there is an ever-increasing need for expanding bandwidth, decreasing delay and data transfer costs. These needs necessitate the efficient use of network facilities. Network coding is a new paradigm that allows the intermediate nodes in a network to create new packets by combining the packets recei...

متن کامل

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2015