Towards optimal and efficient perfectly secure message transmission

被引:0
|
作者
Fitzi, Matthias [1 ]
Franklin, Matthew [2 ]
Garay, Juan [3 ]
Vardhan, S. Harsha [4 ]
机构
[1] ETH, Dept Comp Sci, Zurich, Switzerland
[2] Dept Comp Sci, Davis, CA 95016 USA
[3] Bell Labs, Murray Hill, NJ 07974 USA
[4] IIT, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perfectly secure message transmission (PSMT), a problem formulated by Dolev, Dwork, Waarts and Yung, involves a sender S and a recipient R who are connected by n synchronous channels of which up to t may be corrupted by an active adversary. The goal is to transmit, with perfect security, a message from S to R. PSMT is achievable if and only if n > 2t. For the case n > 2t, the lower bound on the number of communication rounds between S and R required for PSMT is 2, and the only known efficient (i.e., polynomial in n) two-round protocol involves a communication complexity of O(n(3)l) bits, where l is the length of the message. A recent solution by Agarwal, Cramer and de Haan is provably communication-optimal by achieving an asymptotic communication complexity of O(nl) bits; however, it requires the messages to be exponentially large, i.e., L = Omega(2(n)). In this paper we present an efficient communication-optimal two-round PSMT protocol for messages of length polynomial in n that is almost optimally resilient in that it requires a number of channels n >= (2 + epsilon)t, for any arbitrarily small constant epsilon > 0. In this case, optimal communication complexity is O(l) bits.
引用
收藏
页码:311 / +
页数:4
相关论文
共 50 条
  • [1] Optimal perfectly secure message transmission
    Srinathan, K
    Narayanan, A
    Rangan, CP
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 545 - 561
  • [2] Efficient perfectly secure message transmission in synchronous networks
    Sayeed, HM
    AbuAmara, H
    [J]. INFORMATION AND COMPUTATION, 1996, 126 (01) : 53 - 61
  • [3] PERFECTLY SECURE MESSAGE TRANSMISSION
    DOLEV, D
    DWORK, C
    WAARTS, O
    YUNG, M
    [J]. JOURNAL OF THE ACM, 1993, 40 (01) : 17 - 47
  • [4] Efficient Protocols for Perfectly Secure Message Transmission With Applications to Secure Network Coding
    Spini, Gabriele
    Zemor, Gilles
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (10) : 6340 - 6353
  • [5] Perfectly secure message transmission revisited
    Wang, Yongge
    Desmedt, Yvo
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2582 - 2595
  • [6] On Proactive perfectly secure message transmission
    Srinathan, Karman
    Raghavendra, Prasad
    Chandrasekaran, Pandu Rangan
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 461 - +
  • [7] Perfectly secure message transmission revisited
    Desmedt, Y
    Wang, Y
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 502 - 517
  • [8] Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
    Deligios, Giovanni
    Liu-Zhang, Chen-Da
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2023, PT I, 2024, 13950 : 77 - 93
  • [9] Asymptotically optimal two-round perfectly secure message transmission
    Agarwal, Saurabh
    Cramer, Ronald
    de Haan, Robbert
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 394 - 408
  • [10] Efficient Perfectly Reliable and Secure Message Transmission tolerating mobile adversary
    Patra, Arpita
    Choudhary, Ashish
    Vaidyanathan, Madhu
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 170 - 186