Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary

نویسندگان

  • Arpita Patra
  • Bhavani Shankar
  • Ashish Choudhury
  • K. Srinathan
  • C. Pandu Rangan
چکیده

In this paper we study Perfectly Secure Message Transmission (PSMT) between a sender S and a receiver R, connected in a directed synchronous network through multiple parallel edges (called wires), each of which are directed from S to R or vice-versa. The unreliability of the network is modeled by an Byzantine adversary with infinite power. Thus the security we gain is information theoretic. We investigate the problem with two different adversarial flavors: (i)threshold: number of nodes corrupted by a Byzantine adversary is parametrized by t and (ii) non-threshold: the behavior of the adversary is captured by an adversary structure which is the snapshots of adversary at different executions. In [3], the authors proved the necessity and sufficiency of at least max(3t− 2u + 1, 2t + 1) wires from S to R for any PSMT protocol in such a network, where u is the number of wires from R to S. However, their PSMT protocol was exponential both in terms of number of phases and communication complexity. In addition, they also presented a polynomial phase PSMT protocol with n′ = max(3t − u + 1, 2t + 1) wires from S to R. In this paper, we significantly improve the exponential phase protocol and present an elegant and efficient three phase PSMT protocol with polynomial communication complexity (and computational complexity) with n = max(3t − 2u + 1, 2t + 1) wires from S to R. Also with n′ = max(3t − u + 1, 2t + 1) wires from S to R, we are able to further improve the communication complexity of our three ? A brief version of this paper appeared in [17] which permits full expanded version to appear elsewhere ?? Work Supported by Project No. CSE/05-06/076/DITX/CPAN on Protocols for Secure Communication and Computation Sponsored by Department of Information Technology, Government of India. ? ? ? Work Supported by Project No. CSE/05-06/076/DITX/CPAN on Protocols for Secure Communication and Computation Sponsored by Department of Information Technology, Government of India. 3 A phase is a send from S to R or R to S phase PSMT protocol. This is a significant improvement over the protocols presented in [3]. Our second contribution in this paper is the first ever characterization for any two phase PSMT protocol between S and R in such a network. Finally, we also characterize PSMT protocol in directed networks tolerating non-threshold adversary. In [5], the authors have given the characterization for PSMT against non-threshold adversary. However, in their characterization, they have only considered the paths from S to R, excluding the feedback paths (i.e paths from R to S) and hence their characterization holds good for single phase protocols. We characterize multiphase PSMT considering feedback paths.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary

Patra et al. [25] gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold Q adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. Moreover, they have left it as an open...

متن کامل

Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary

In this paper we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in a synchronous network, where S and R are connected by some vertex disjoint paths called wires such that each wire acts as a oneway channel facilitating communication either from S to R or vice-versa. Some of these wires may be corrupt...

متن کامل

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries

We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...

متن کامل

Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary

In this paper, we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the influence of an all powerful mobile Byzantine adversary. We design a three phase bit optimal PSMT protocol tolerating mobile adversary, whose communication complexity ma...

متن کامل

Unconditionally Reliable Message Transmission in Directed Hypergraphs

We study the problem of unconditionally reliable message transmission (URMT), where two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directedhypergraph, a part of which may be under the influence of an adversary having unbounded computingpower. S intends to transmit a message m to R, such that R should correctly obtain S’s messag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007