On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission

被引:2
|
作者
Kishore, Ravi [1 ]
Kumar, Ashutosh [2 ]
Vanarasa, Chiranjeevi [1 ]
Srinathan, Kannan [1 ]
机构
[1] Int Inst Informat Technol, Hyderabad 500032, Andhra Prades, India
[2] Univ Calif Los Angeles, Comp Sci Dept, Los Angeles, CA 90095 USA
关键词
Secure communication; information theoretic security; fault-tolerance; CONNECTIVITY;
D O I
10.1109/TIT.2017.2776099
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a network of n nodes (modeled as a digraph), the goal of a perfectly secret message transmission (PSMT) protocol is to replicate sender's message m at the receiver's end without revealing any information about m to a computationally unbounded adversary that eavesdrops on any t nodes. The adversary may be mobile too that is, it may eavesdrop on a different set of t nodes in different rounds. We prove a necessary and sufficient condition on the synchronous network for the existence of r-round PSMT protocols, for any given r > 0; further, we show that round-optimality is achieved without trading-off the communication complexity; specifically, our protocols have an overall communication complexity of O(n) elements of a finite field to perfectly transmit one field element. Apart from optimality/scalability, two interesting implications of our results are: 1) adversarial mobility does not affect its tolerability: PSMT tolerating a static t-adversary is possible if and only if PSMT tolerating mobile t-adversary is possible; and 2) mobility does not affect the round optimality: the fastest PSMT protocol tolerating a static t-adversary is not faster than the one tolerating a mobile t-adversary.
引用
收藏
页码:1404 / 1422
页数:19
相关论文
共 50 条
  • [1] Round-Optimal Perfectly Secret Message Transmission with Linear Communication Complexity
    Kishore, Ravi
    Kumar, Ashutosh
    Vanarasa, Chiranjeevi
    Kannan, Srinathan
    [J]. INFORMATION THEORETIC SECURITY (ICITS 2015), 2015, 9063 : 33 - 50
  • [2] Round-optimal and efficient verifiable secret sharing
    Fitzi, Matthias
    Garay, Juan
    Gollakota, Shyamnath
    Rangan, C. Pandu
    Srinathan, Karman
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 329 - 342
  • [3] Asymptotically optimal two-round perfectly secure message transmission
    Agarwal, Saurabh
    Cramer, Ronald
    de Haan, Robbert
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 394 - 408
  • [4] Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)
    Tuhin, Mohammed Ashraful Alam
    Safavi-Naini, Reihaneh
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2012, 7035 : 173 - 181
  • [5] Optimal perfectly secure message transmission
    Srinathan, K
    Narayanan, A
    Rangan, CP
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 545 - 561
  • [6] Round-Optimal Byzantine Agreement
    Ghinea, Diana
    Goyal, Vipul
    Chen-Da Liu-Zhang
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 96 - 119
  • [7] Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
    Keith M. Martin
    Maura B. Paterson
    Douglas R. Stinson
    [J]. Cryptography and Communications, 2011, 3 : 65 - 86
  • [8] Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
    Martin, Keith M.
    Paterson, Maura B.
    Stinson, Douglas R.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2011, 3 (02): : 65 - 86
  • [9] Towards optimal and efficient perfectly secure message transmission
    Fitzi, Matthias
    Franklin, Matthew
    Garay, Juan
    Vardhan, S. Harsha
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 311 - +
  • [10] Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
    Kurosawa, Kaoru
    Suzuki, Kazuhiro
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (11) : 5223 - 5232