scispace - formally typeset
Open AccessPosted Content

Protocols for Reliable and Secure Message Transmission.

Ashish Choudhury
- 01 Jan 2010 - 
- Vol. 2010, pp 281
TLDR
Several new/improved/efficient/optimal solutions are reported, affirmative/negative answers to several significant open problems are given, and first solutions to several newly formulated problems are provided.
Abstract
Consider the following problem: a sender S and a receiver R are part of an unreliable, connected, distributed network. The distrust in the network is modelled by an entity called adversary, who has unbounded computing power and who can corrupt some of the nodes of the network (excluding S and R) in a variety of ways. S wishes to send to R a message m that consists of l elements, where l ≥ 1, selected uniformly from a finite field F. The challenge is to design a protocol, such that after interacting with S as per the protocol, R should output m without any error (perfect reliability). Moreover, this hold irrespective of the disruptive actions done by the adversary. This problem is called reliable message transmission or RMT in short. The problem of secure message transmission or SMT in short requires an additional constraint that the adversary should not get any information about the message what so ever in information theoretic sense (perfect secrecy). Security against an adversary with infinite computing power is also known as non-cryptographic or information theoretic or Shannon security and this is the strongest notion of security. Notice that since the adversary has unbounded computing power, we cannot solve RMT and SMT problem by using classical cryptographic primitives such as public key cryptography, digital signatures, authentication schemes, etc as the security of all these primitives holds good only against an adversary having polynomially bounded computing power. RMT and SMT problem can be studied in various network models and adversarial settings. We may use the following parameters to describe different settings/models for studying RMT/SMT: 1. Type of Underlying Network — Undirected Graph, Directed Graph, Hypergraph. 2. Type of Communication — Synchronous, Asynchronous. 3. Adversary capacity — Threshold Static, Threshold Mobile, Non-threshold Static, Non-threshold Mobile. 4. Type of Faults — Fail-stop, Passive, Byzantine, Mixed. Irrespective of the settings in which RMT/SMT is studied, the following issues are common: 1. Possibility: What are the necessary and sufficient structural conditions to be satisfied by the underlying network for the existence of any RMT/SMT protocol, tolerating a given type of adversary? 2. Feasibility: Once the existence of a RMT/SMT protocol in a network is ascertained, the next natural question is, does there exist an efficient protocol on the given network? 3. Optimality: Given a message of specific length, what is the minimum communication complexity (lower bound) needed by any RMT/SMT protocol to transmit the message and how to design a polynomial time RMT/SMT protocol whose total communication complexity matches the lower bound on the communication complexity (optimal protocol)? In this dissertation, we look into the above issues in several network models and adversarial settings. This thesis reports several new/improved/efficient/optimal solutions, gives affirmative/negative answers to several significant open problems and last but not the least, provides first solutions to several newly formulated problems.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity

TL;DR: A three phase communication optimal perfectly secure message transmission protocol tolerating a computationally unbounded mobile mixed adversary is designed and improves the nine phase OPSMT protocol of [2].
Book ChapterDOI

Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversary

TL;DR: The first single round almost perfectly secure message transmission protocol tolerating Q2 adversary structure is shown, which is much more computationally efficient and relatively simpler than the previous single round, communication optimal protocol of Srinathan et al. (PODC '08).
Book ChapterDOI

On the communication complexity of reliable and secure message transmission in asynchronous networks

TL;DR: In this paper, the authors studied the communication complexity of Reliable Message Transmission (RMT) and secure message transmission (SMT) protocols in asynchronous settings and derived tight bounds on communication complexity for both perfect and statistical RMT protocols.
Posted Content

Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.

TL;DR: In this paper, the first single round almost perfectly secure message transmission protocol tolerating general, non-threshold Q adversary structure was proposed, and the complexity of the protocol is polynomial in the size of underlying linear secret sharing scheme (LSSS) and adversary structure.
Posted Content

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.

TL;DR: Tight bounds are derived on the communication complexity of Reliable Message Transmission and Secure Message Transmission protocols in asynchronous settings and the interesting conclusions derived are: RMT: Asynchrony increases the communication complex of perfect RMT protocols, however, asynchrony has no impact on the Communication complexity of statistical R MT protocols.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.