Perfectly Secure Message Transmission in Two Rounds

被引:7
|
作者
Spini, Gabriele [1 ,2 ,3 ]
Zemor, Gilles [1 ]
机构
[1] Univ Bordeaux, Inst Math Bordeaux, UMR 5251, 351 Cours Liberat, F-33400 Talence, France
[2] Leiden Univ, Math Inst, Leiden, Netherlands
[3] CWI Amsterdam, Amsterdam, Netherlands
来源
关键词
Perfectly Secure Message Transmission; SCHEME;
D O I
10.1007/978-3-662-53641-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the model that has become known as "Perfectly Secure Message Transmission" (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately and reliably, i.e. in such a way that Eve will not get any information about the message while Bob will be able to recover it completely. In this paper, we focus on protocols that work in two transmission rounds for n = 2t + 1. We break from previous work by following a conceptually simpler blueprint for achieving a PSMT protocol. We reduce the previously best-known communication complexity, i.e. the number of transmitted bits necessary to communicate a 1-bit secret, from O(n(3) log n) to O( n(2) log n). Our protocol also answers a question raised by Kurosawa and Suzuki and hitherto left open: their protocol reaches optimal transmission rate for a secret of size O(n(2) log n) bits, and the authors raised the problem of lowering this threshold. The present solution does this for a secret of O(n log n) bits.
引用
收藏
页码:286 / 304
页数:19
相关论文
共 50 条
  • [1] PERFECTLY SECURE MESSAGE TRANSMISSION
    DOLEV, D
    DWORK, C
    WAARTS, O
    YUNG, M
    [J]. JOURNAL OF THE ACM, 1993, 40 (01) : 17 - 47
  • [2] Perfectly secure message transmission revisited
    Wang, Yongge
    Desmedt, Yvo
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2582 - 2595
  • [3] On Proactive perfectly secure message transmission
    Srinathan, Karman
    Raghavendra, Prasad
    Chandrasekaran, Pandu Rangan
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 461 - +
  • [4] Perfectly secure message transmission revisited
    Desmedt, Y
    Wang, Y
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 502 - 517
  • [5] Optimal perfectly secure message transmission
    Srinathan, K
    Narayanan, A
    Rangan, CP
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 545 - 561
  • [6] Asymptotically optimal two-round perfectly secure message transmission
    Agarwal, Saurabh
    Cramer, Ronald
    de Haan, Robbert
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 394 - 408
  • [7] Efficient perfectly secure message transmission in synchronous networks
    Sayeed, HM
    AbuAmara, H
    [J]. INFORMATION AND COMPUTATION, 1996, 126 (01) : 53 - 61
  • [8] Towards optimal and efficient perfectly secure message transmission
    Fitzi, Matthias
    Franklin, Matthew
    Garay, Juan
    Vardhan, S. Harsha
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 311 - +
  • [9] Perfectly Secure Message Transmission Against Rational Adversaries
    Fujita, Maiki
    Koshiba, Takeshi
    Yasunaga, Kenji
    [J]. IEEE Journal on Selected Areas in Information Theory, 2022, 3 (02): : 390 - 404
  • [10] Network-Agnostic Perfectly Secure Message Transmission Revisited
    Bhimrajka, Nidhish
    Choudhury, Ashish
    Varadarajan, Supreeth
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2023, PT II, 2024, 14460 : 25 - 44