Revisiting a secret sharing approach to network codes

Zhaohui Tang*, Hoon Wei Lim, Huaxiong Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)


Secret sharing has been used in multicast network coding to transmit information securely in the presence of a wiretapper who is capable of eavesdropping a bounded number of network edges. Typically information-theoretic security against the wiretapper can be achieved when multicasting a message by concatenating it with some random symbols and representing them with a carefully chosen network code. In this paper, we revisit a secret sharing approach to network codes. Particularly, we are concerned with whether or not a given network code is secure. We derive a necessary and sufficient condition for a given network code to be secure for a network coding instance. In comparison with previous work, our condition is more explicit in the sense that it is easier to verify. Furthermore, we devise a precise algorithm to transform an insecure network code into a secure one. Our algorithm achieves smaller secure code alphabet size over previous work.

Original languageEnglish
Title of host publicationProvable Security
Subtitle of host publication6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings
EditorsTsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Number of pages18
ISBN (Electronic)9783642332722
ISBN (Print)9783642332715
Publication statusPublished - 2012
Externally publishedYes
Event6th International Conference on Provable Security, ProvSec 2012 - Chengdu, China
Duration: 26 Sep 201228 Sep 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other6th International Conference on Provable Security, ProvSec 2012


  • network coding
  • secret sharing
  • information-theoretic security

Fingerprint Dive into the research topics of 'Revisiting a secret sharing approach to network codes'. Together they form a unique fingerprint.

Cite this