Perfectly Secure Message Transmission Against Rational Adversaries
نویسندگان
چکیده
Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the sender can securely and reliably transmit messages to receiver using multiple channels. An adversary corrupt subset of channels commit eavesdropping tampering attacks over In this work, we introduce game-theoretic security model for SMT in adversaries have some preferences execution. We define rational “timid” who prefer violate requirements but do not be detected. First, consider basic setting where single protocol. construct perfect protocols against any corrupting all one Since minority corruption required traditional setting, our results demonstrate way circumventing impossibility approach. Next, study corrupted cooperate. cannot hope if corrupts or cooperate maliciously, scenario arise from model. also both malicious exist.
منابع مشابه
Perfectly Secure Message Transmission Scheme against Rational Adversaries
Secure Message Transmission (SMT) is a two-party cryptographic scheme by which a sender securely and reliably sends messages to a receiver using n channels. Suppose that an adversary corrupts at most t out of n channels and makes eavesdropping or tampering over the corrupted channels. It is known that if t < n/2 then the perfect SMT (PSMT) in the information-theoretic sense is achievable and if...
متن کاملRound-efficient perfectly secure message transmission scheme against general adversary
In the model of Perfectly Secure Message Transmission Schemes (PSMTs), there are n channels between a sender and a receiver, and they share no key. An infinitely powerful adversary A can corrupt (observe and forge) the messages sent through some subset of n channels. For non-threshold adversaries called Q, Kumar et al. showed a many round PSMT [8]. In this paper, we show round efficient PSMTs a...
متن کاملPerfectly Secure Message Transmission in Two Rounds
In the model that has become known as “Perfectly Secure Message Transmission” (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately...
متن کاملPerfectly Secure Message Transmission Tolerating Mixed Adversary
In this paper, we study the issues related to the possibility, feasibility and optimality for perfectly secure message transmission (PSMT) in an undirected synchronous network, under the influence of a mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, fail-stop and passive fashion respectively. Specifically, we answer the following ...
متن کاملAsynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE journal on selected areas in information theory
سال: 2022
ISSN: ['2641-8770']
DOI: https://doi.org/10.1109/jsait.2022.3188923