2022
DOI: 10.48550/arxiv.2204.06511
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

On Extremal Rates of Secure Storage over Graphs

Abstract: A secure storage code maps K source symbols, each of L w bits, to N coded symbols, each of L v bits, such that each coded symbol is stored in a node of a graph. Each edge of the graph is either associated with D of the K source symbols such that from the pair of nodes connected by the edge, we can decode the D source symbols and learn no information about the remaining K − D source symbols; or the edge is associated with no source symbols such that from the pair of nodes connected by the edge, nothing about th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Specifically, all extremal graphs with storage code capacity 4/3 appear to go beyond the techniques of this work. Regarding generalizations, we note that our model is the most elementary, where we have focused on the highest capacity values, i.e., best rate scenarios instead of lowest capacity values, i.e., worst rate scenarios, or other physically meaningful rates; decoding constraints are placed on a pair of nodes in this work instead of an arbitrary set of nodes, i.e., we may have a hypergraph rather than a graph [2]; each edge is associated with only one source symbols instead of multiple source symbols where the decoding structure can be more diverse [1]. Finally, from an extremal rate and network perspective, we may view combinatorial objects using the metric of capacity and study further extremal (largest, densest, most (linearly) independent) graphs, set families, vector spaces etc.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Specifically, all extremal graphs with storage code capacity 4/3 appear to go beyond the techniques of this work. Regarding generalizations, we note that our model is the most elementary, where we have focused on the highest capacity values, i.e., best rate scenarios instead of lowest capacity values, i.e., worst rate scenarios, or other physically meaningful rates; decoding constraints are placed on a pair of nodes in this work instead of an arbitrary set of nodes, i.e., we may have a hypergraph rather than a graph [2]; each edge is associated with only one source symbols instead of multiple source symbols where the decoding structure can be more diverse [1]. Finally, from an extremal rate and network perspective, we may view combinatorial objects using the metric of capacity and study further extremal (largest, densest, most (linearly) independent) graphs, set families, vector spaces etc.…”
Section: Discussionmentioning
confidence: 99%
“…Note that for a special 2-color node, at least one of V [1] , V [2] will be one symbol so that V will contain no more than three symbols (when a node V is simultaneously W 1 -special and W 2 -special, V will have only two symbols and we may zero-pad to make its length three). This completes the assignment for all 2-color nodes and the code construction is complete.…”
Section: Code Constructionmentioning
confidence: 99%
See 3 more Smart Citations