Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/134137
DC Field | Value | |
---|---|---|
dc.title | Reliable broadcasting and secure distributing in channel networks | |
dc.contributor.author | Bao, F. | |
dc.contributor.author | Funyu, Y. | |
dc.contributor.author | Hamada, Y. | |
dc.contributor.author | Igarashl, Y. | |
dc.date.accessioned | 2016-12-20T08:43:53Z | |
dc.date.available | 2016-12-20T08:43:53Z | |
dc.date.issued | 1998 | |
dc.identifier.citation | Bao, F., Funyu, Y., Hamada, Y., Igarashl, Y. (1998). Reliable broadcasting and secure distributing in channel networks. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E81-A (5) : 796-806. ScholarBank@NUS Repository. | |
dc.identifier.issn | 09168508 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/134137 | |
dc.description.abstract | Let T1,-,Tn be n spanning trees rooted at node r of graph G. If for any node v, n paths from r to v, each path in each spanning tree of T1,-,Tn, are internally disjoint, then T1,-,Tn are said to be independent spanning trees rooted at r. A graph G is called an n-channel graph if G has n independent spanning trees rooted at each node of G. We generalize the definition of n-channel graphs. If for any node v of G, among the n paths from r to v, each path in each spanning tree of T1,-,Tn, there are k internally disjoint paths, then T\,-,Tn are said to be (fc, n)-independent spanning trees rooted at r of G. A graph G is called a (fc.n)-channel graph if G has (k, n)independent spanning trees rooted at each node of G. We study two fault-tolerant communication tasks in (fc,n)-channel graphs. The first task is reliable broadcasting. We analyze the relation between the reliability and the efficiency of broadcasting in (k, n)channel graphs. The second task is secure message distribution such that one node called the distributor attempts to send different messages safely to different nodes. We should keep each message secret from the nodes called adversaries. We give two message distribution schemes in (k, n)-channel graphs. The first scheme uses secret sharing, and it can tolerate up to t + k -n listening adversaries for any t < n if G is a (fc,n)-channel graph. The second scheme uses unverifiable secret sharing, and it can tolerate up to t + k -n disrupting adversaries for any t < n/3 if G is a (k, n)-channel graph. | |
dc.subject | Broadcasting | |
dc.subject | Distributing | |
dc.subject | Fault tolerance, independent | |
dc.subject | Networks | |
dc.subject | Secret sharing | |
dc.subject | Spanning trees | |
dc.type | Article | |
dc.contributor.department | INSTITUTE OF SYSTEMS SCIENCE | |
dc.description.sourcetitle | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | |
dc.description.volume | E81-A | |
dc.description.issue | 5 | |
dc.description.page | 796-806 | |
dc.description.coden | IFESE | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.