Efficient and universal corruption resilient fountain codes

Asaf Cohen, Shlomi Dolev, Nir Tzachar

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

In this paper, we present a new family of fountain codes which overcome adversarial errors. That is, we consider the possibility that some portion of the arriving packets of a rateless erasure code are corrupted in an undetectable fashion. In practice, the corrupted packets may be attributed to a portion of the communication paths which are controlled by an adversary or to a portion of the sources that are malicious. The presented codes resemble and extend rateless codes. Yet, their benefits over existing coding schemes are manifold. First, to overcome the corrupted packets, our codes use information theoretic techniques, rather than cryptographic primitives. Thus, no secret channel between the senders and the receivers is required. Second, the encoders in the suggested scheme are oblivious to the strength of the adversary, yet perform as if its strength was known in advance. Third, the sparse structure of the codes facilitates efficient decoding. Finally, the codes easily fit a decentralized scenario with several sources, when no communication between the sources is allowed. We present both exhaustive as well as efficient decoding rules. Beyond the obvious use as a rateless codes, our codes have important applications in distributed computing.

Original languageEnglish
Article number6588547
Pages (from-to)4058-4066
Number of pages9
JournalIEEE Transactions on Communications
Volume61
Issue number10
DOIs
StatePublished - 1 Oct 2013

Keywords

  • Fountain codes
  • adversarial errors
  • distributed encoding
  • rateless codes
  • sparse codes

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Efficient and universal corruption resilient fountain codes'. Together they form a unique fingerprint.

Cite this