Multishot Capacity of Networks with Restricted Adversaries

📅 2025-06-03
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper investigates the multi-round network coding capacity under restricted adversarial settings—specifically, when an adversary can corrupt only a subset of edges (e.g., boundary links)—and characterizes the maximum achievable rate for multi-slot communication. Leveraging an adversarial channel model, the authors combine information-theoretic bounds, algebraic code constructions, and signal-space alignment techniques to derive exact multi-slot capacities for canonical three-layer networks: Diamond, Mirrored Diamond, and Butterfly. They establish tight capacity formulas for the first two networks and fully resolve the multi-round capacity of the Butterfly network under restricted adversarial attacks—thereby closing a fundamental theoretical gap. Furthermore, they propose a universal constructive scheme for achieving capacity in arbitrary three-layer networks, unifying the understanding of robustness limits across classical network topologies under multi-slot adversarial coding.

Technology Category

Application Category

📝 Abstract
We investigate adversarial network coding and decoding, focusing on the multishot regime and when the adversary is restricted to operate on a vulnerable region of the network. Errors can occur on a proper subset of the network edges and are modeled via an adversarial channel. The paper contains both bounds and capacity-achieving schemes for the Diamond Network, the Mirrored Diamond Network, and generalizations of these networks. We also initiate the study of the capacity of 3-level networks in the multishot setting by computing the multishot capacity of the Butterfly Network, considered in [IEEE Transactions on Information Theory, vol. 69, no. 6, 2023], which is a variant of the network introduced by Ahlswede, Cai, Li and Yeung in 2000.
Problem

Research questions and friction points this paper is trying to address.

Study adversarial network coding in multishot regime
Analyze capacity with restricted adversary on vulnerable edges
Compute multishot capacity for Diamond and Butterfly Networks
Innovation

Methods, ideas, or system contributions that make the work stand out.

Adversarial network coding with restricted vulnerable regions
Capacity-achieving schemes for Diamond and Mirrored Networks
Multishot capacity analysis for 3-level Butterfly Network
🔎 Similar Papers
No similar papers found.
Giuseppe Cotardo
Giuseppe Cotardo
Virginia Tech
Coding TheoryComplexity TheoryCombinatorics
G
Gretchen L. Matthews
Virginia Tech, Blacksburg, U.S.A.
A
A. Ravagnani
Eindhoven University of Technology, the Netherlands
J
Julia Shapiro
Virginia Tech, Blacksburg, U.S.A.