scispace - formally typeset
Journal ArticleDOI

Perfectly reliable and secure message transmission tolerating mobile adversary

TLDR
It is shown that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols, and the characterisation for PRMT/PSMT against non-threshold static and non-Threshold mobile adversary are not same.
Abstract
We study the problem of perfectly reliable message transmission (PRMT) and perfectly secure message transmission (PSMT) in an undirected synchronous network tolerating an all powerful threshold mobile Byzantine adversary Specifically, we show that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols We also characterise PSMT in directed networks tolerating mobile adversary All existing PRMT and PSMT protocols abstract the paths between the sender and the receiver as wires, neglecting the intermediate nodes in the paths, thus causing significant over estimation in the communication and round complexity of protocols Here, we consider the underlying paths as a whole instead of abstracting them as wires and derive a tight bound on the number of rounds required to achieve reliable communication tolerating a threshold mobile adversary with arbitrary roaming speed Finally, we briefly study PRMT and PSMT protocols in the presence of non-threshold mobile Byzantine adversary Even though the characterisation for PRMT/PSMT is shown to be same against both threshold static and threshold mobile adversary (in this article), we show that the characterisation for PRMT/PSMT against non-threshold static and non-threshold mobile adversary are not same

read more

Citations
More filters
Journal ArticleDOI

Secure message transmission in asynchronous networks

TL;DR: It is proved that in an asynchronous network, if all the n wires are directed from S to R, then any PSMT protocol tolerating A"t^s^t^a^t+1^i^c is possible iff n>3t, and it is shown that asynchrony of the network does not demand higher connectivity of thenetwork for SSMT protocols.
Posted Content

Statistically Reliable and Secure Message Transmission in Directed Networks.

TL;DR: The authors in [14, 55] claimed that their protocol is efficient and has polynomial computational and communication complexity, however, it is shown that it is not so, and an adversary strategy is specified, which may cause the protocol to have exponential computational andcommunication complexity.
Journal Article

A Novel approach to Adaptively Secure Message Transmission in The Non-Erasure Model

TL;DR: A new Adaptively Secure Message Transmission (ASMT) is presented that is based on any trapdoor function in the non-erasure model to allow any pair of nodes in a network to communicate in an adaptively secure manner assuming that the adversary observes (eavesdrops) the communications on all paths but actively corrupts a fraction of these paths.
Proceedings ArticleDOI

Distributed CONGEST Algorithms against Mobile Adversaries

Orr Fischer, +1 more
TL;DR: In this article , Gelles et al. showed that for general (2f + 1) edge-connected graphs with f-mobile edge adversaries, they almost match the bounds known for the f-static setting, when provided a trusted preprocessing phase.
References
More filters
Book

The Theory of Error-Correcting Codes

TL;DR: This book presents an introduction to BCH Codes and Finite Fields, and methods for Combining Codes, and discusses self-dual Codes and Invariant Theory, as well as nonlinear Codes, Hadamard Matrices, Designs and the Golay Code.
Journal ArticleDOI

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

TL;DR: In this paper, the authors considered factoring integers and finding discrete logarithms on a quantum computer and gave an efficient randomized algorithm for these two problems, which takes a number of steps polynomial in the input size of the integer to be factored.
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Proceedings Article

Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)

TL;DR: The above bounds on t, where t is the number of players in actors, are tight!
Related Papers (5)