On the Extremal Source Key Rates for Secure Storage over Graphs

📅 2026-01-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study investigates the extremal source-key capacity for secure storage systems over graph structures, where each edge-associated source symbol must be perfectly recoverable by its two incident nodes while remaining information-theoretically secure against all other nodes. By introducing shared source keys and enforcing edge-wise correctness and security constraints, the work analyzes the achievable upper bound on the ratio of source symbol size to key size. Combining information-theoretic security models, graph-theoretic analysis, and explicit coding constructions, the paper fully characterizes the extremal capacities for several graph classes: those achieving unit capacity, graphs enabling secure storage without any secret keys, and generalized extremal graphs under multiple source symbols. Furthermore, it establishes necessary and sufficient graphical conditions for attaining extremal capacity in both single-source and multi-source settings.

Technology Category

Application Category

📝 Abstract
This paper investigates secure storage codes over graphs, where multiple independent source symbols are encoded and stored at graph nodes subject to edge-wise correctness and security constraints. For each edge, a specified subset of source symbols must be recoverable from its two incident nodes, while no information about the remaining sources is revealed. To meet the security requirement, a shared source key may be employed. The ratio between the source symbol size and the source key size defines the source key rate, and the supremum of all achievable rates is referred to as the source key capacity. We study extremal values of the source key capacity in secure storage systems and provide complete graph characterizations for several fundamental settings. For the case where each edge is associated with a single source symbol, we characterize all graphs whose source key capacity equals one. We then generalize this result to the case where each edge is associated with multiple source symbols and identify a broad class of graphs that achieve the corresponding extremal capacity under a mild structural condition. In addition, we characterize all graphs for which secure storage can be achieved without using any source key.
Problem

Research questions and friction points this paper is trying to address.

secure storage
source key rate
graph
information security
extremal capacity
Innovation

Methods, ideas, or system contributions that make the work stand out.

secure storage codes
source key capacity
graph characterization
information-theoretic security
extremal rates
🔎 Similar Papers
No similar papers found.