Two Network Coding Talks for the price of one: Security, Low Complexity

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=oihVYOjNQvI



Duration: 57:00
31 views
1


Network coding is good. Among other advantages, it allows for greater throughput, more robust code design, and decentralization of code design. However, if care is not taken, a single malicious adversary hiding in the network can subvert the entire code design and cause catastrophic decoding errors. We present a tight rate-region for this problem, and what is essentially an error-correction scheme for network codes, and show how these codes can protect against a malicious adversary who not only eavesdrops, but also injects false packets into the network. Our schemes are generalizations of Verifiable Secret Sharing schemes to the case of multicasting over a network. In the second part of the talk, we present a simple new result hot off the presses. We show that a very restricted and simple set of linear encoding operations (that we call permute-and-add codes) are all that are needed to asymptotically achieve network multicast capacity. These have the advantage that besides being easy to describe, their implementation complexity is quadratically lower than those of currently used network codes.




Other Videos By Microsoft Research


2016-09-06Secure Personalization: Towards Trustworthy Recommender Systems* [1/16]
2016-09-06Computer Science for the future
2016-09-06GeoDec: Enabling Geospatial Decision Making
2016-09-0610 Rules for Strategic Innovators
2016-09-06Which Supervised Learning Method Works Best for What?  An Empirical Comparison
2016-09-06Using ACTIVboard In Interactive Presentations
2016-09-06Secure Trusted Overlay Networks for Robust Privacy-Protecting Communication
2016-09-06Dialogue Session: Worklife Balance and the Retention of Talent
2016-09-06From textons to parts: Local image features for texture and object recognition
2016-09-06Efficient Actions in Dynamic Auction Environment
2016-09-06Two Network Coding Talks for the price of one: Security, Low Complexity
2016-09-06Some recent results in camera calibration and shape reconstruction
2016-09-06Implicit Feedback: Techniques for Deployment and Evaluation
2016-09-06Better k-best Parsing, Hypergraphs, and Dynamic Programming
2016-09-06Rock 'n Roll : Earthquake & Disaster Preparedness
2016-09-06Understanding Customers: Shaping Our Future through Understanding Social Change
2016-09-06Fast Database and Data Streaming Operations using Graphics Processors
2016-09-06Hyperparameter and Kernel Learning for Graph Based Semi-Supervised Classification
2016-09-06Multi-Engine Machine Translation Guided by Explicit Word Matching
2016-09-06Using Compression Models to Filter Spam; Exploiting Structural Information for Categorization
2016-09-06The Man Who Knew Too Much: Alan Turing and the Invention of the Computer [1/4]



Tags:
microsoft research