当前位置: 主页 > 专家讲坛 >

Secrecy and Robustness for Active Attack in Secure Network Coding

时间:2017-04-21 15:30点击:
 
讲  座
名  称            
Secrecy and Robustness for Active Attack in Secure Network Coding
讲座时间 2017-04-24 14:00:00
讲座地点 北校区新科技楼1012会议室
讲座人 Masahito Hayashi教授
讲座人介绍 Masahito Hayashi was born in Japan in 1971. He received the B.S. degree from the Faculty of Sciences in Kyoto University, Japan, in 1994 and the M.S. and Ph.D. degrees in Mathematics from Kyoto University, Japan, in 1996 and 1999, respectively. He worked in Kyoto University as a Research Fellow of the Japan Society of the Promotion of Science (JSPS) from 1998 to 2000, and worked in the Laboratory for Mathematical Neuroscience, Brain Science Institute, RIKEN from 2000 to 2003, and worked in ERATO Quantum Computation and Information Project, Japan Science and Technology Agency (JST) as the Research Head from 2000 to 2006.He also worked in the Superrobust Computation Project Information Science and Technology Strategic Core (21st Century COE by MEXT) Graduate School of Information Science and Technology, The University of Tokyo as Adjunct Associate Professor from 2004 to 2007. He worked in the Graduate School of Information Sciences, Tohoku University as Associate Professor from 2007 to 2012. In 2012, he joined the Graduate School of Mathematics, Nagoya University as Professor. He also worked in Centre for Quantum Technologies, National University of Singapore as Visiting Research Associate Professor from 2009 to 2012 and as Visiting Research Professor from 2012 to now.
    In 2011, he received Information Theory Society Paper Award (2011) for Information-Spectrum Approach to Second-Order Coding Rate in Channel Coding. In 2016, he received the Japan Academy Medal from the Japan Academy and the JSPS Prize from Japan Society for the Promotion of Science.
He elevated to an IEEE fellow in 2017.
讲座内容 In the network coding, we discuss the effect by sequential error injection to information leakage. We show that there is no improvement when the network is composed of linear operations. However, when the network contains non-linear operations, we find a counterexample to improve Eve’s obtained information. Further, we discuss the asymptotic rate in the linear network under the secrecy and robustness

所属单位:通信工程学院
转载出处:西安电子科技大学学术信息网
(责任编辑:学术年会)
------分隔线----------------------------