Journal ArticleDOI
Perfectly reliable and secure message transmission tolerating mobile adversary
TLDR
It is shown that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols, and the characterisation for PRMT/PSMT against non-threshold static and non-Threshold mobile adversary are not same.Abstract:
We study the problem of perfectly reliable message transmission (PRMT) and perfectly secure message transmission (PSMT) in an undirected synchronous network tolerating an all powerful threshold mobile Byzantine adversary Specifically, we show that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols We also characterise PSMT in directed networks tolerating mobile adversary All existing PRMT and PSMT protocols abstract the paths between the sender and the receiver as wires, neglecting the intermediate nodes in the paths, thus causing significant over estimation in the communication and round complexity of protocols Here, we consider the underlying paths as a whole instead of abstracting them as wires and derive a tight bound on the number of rounds required to achieve reliable communication tolerating a threshold mobile adversary with arbitrary roaming speed Finally, we briefly study PRMT and PSMT protocols in the presence of non-threshold mobile Byzantine adversary Even though the characterisation for PRMT/PSMT is shown to be same against both threshold static and threshold mobile adversary (in this article), we show that the characterisation for PRMT/PSMT against non-threshold static and non-threshold mobile adversary are not sameread more
Citations
More filters
Journal ArticleDOI
Secure message transmission in asynchronous networks
TL;DR: It is proved that in an asynchronous network, if all the n wires are directed from S to R, then any PSMT protocol tolerating A"t^s^t^a^t+1^i^c is possible iff n>3t, and it is shown that asynchrony of the network does not demand higher connectivity of thenetwork for SSMT protocols.
Posted Content
Statistically Reliable and Secure Message Transmission in Directed Networks.
TL;DR: The authors in [14, 55] claimed that their protocol is efficient and has polynomial computational and communication complexity, however, it is shown that it is not so, and an adversary strategy is specified, which may cause the protocol to have exponential computational andcommunication complexity.
Journal Article
A Novel approach to Adaptively Secure Message Transmission in The Non-Erasure Model
TL;DR: A new Adaptively Secure Message Transmission (ASMT) is presented that is based on any trapdoor function in the non-erasure model to allow any pair of nodes in a network to communicate in an adaptively secure manner assuming that the adversary observes (eavesdrops) the communications on all paths but actively corrupts a fraction of these paths.
Proceedings ArticleDOI
Distributed CONGEST Algorithms against Mobile Adversaries
Orr Fischer,Merav Parter +1 more
TL;DR: In this article , Gelles et al. showed that for general (2f + 1) edge-connected graphs with f-mobile edge adversaries, they almost match the bounds known for the f-static setting, when provided a trusted preprocessing phase.
References
More filters
Book
The Theory of Error-Correcting Codes
TL;DR: This book presents an introduction to BCH Codes and Finite Fields, and methods for Combining Codes, and discusses self-dual Codes and Invariant Theory, as well as nonlinear Codes, Hadamard Matrices, Designs and the Golay Code.
Journal ArticleDOI
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
TL;DR: In this paper, the authors considered factoring integers and finding discrete logarithms on a quantum computer and gave an efficient randomized algorithm for these two problems, which takes a number of steps polynomial in the input size of the integer to be factored.
Proceedings ArticleDOI
How to play ANY mental game
TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Proceedings ArticleDOI
Protocols for secure computations
TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Proceedings Article
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)
TL;DR: The above bounds on t , where t is the number of players in actors, are tight!