Correction of adversarial errors in networks

  • Jaggi S
  • Langbergt M
  • Ho T
 et al. 
  • 20


    Mendeley users who have this article in their library.
  • 34


    Citations of this article.


We design codes to transmit information over a network, some subset of which is controlled by a malicious adversary. The computationally unbounded, hidden adversary knows the message to be transmitted, and can observe and change information over the part of the network being controlled. The network nodes do not share resources such as shared randomness or a private key. We first consider a unicast problem in a network with |epsiv parallel, unit-capacity, directed edges. The rate-region has two parts. If the adversary controls a fraction p < 0.5 of the |epsiv edges, the maximal throughput equals (1 - p) |epsiv|. We describe low-complexity codes that achieve this rate-region. We then extend these results to investigate more general multicast problems in directed, acyclic networks

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Get full text


  • Sidharth Jaggi

  • Michael Langbergt

  • Tracey Ho

  • Michelle Effros

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free