Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary

نویسندگان

  • Ashish Choudhury
  • Arpita Patra
  • Ashwinkumar Badanidiyuru
  • K. Srinathan
  • C. Pandu Rangan
چکیده

In the problem of perfectly reliable message transmission (PRMT), a sender S and a receiver R are connected by n bidirectional synchronous channels. A mixed adversary A(tb,tf ,tp) with infinite computing power controls tb, tf and tp channels in Byzantine, failstop and passive fashion respectively. Inspite of the presence of A(tb,tf ,tp), S wants to reliably send a message m to R, using some protocol, without sharing any key with R beforehand. After interacting in phases as per the protocol, R should output m′ = m, without any error. In the problem of perfectly secure message transmission (PSMT), there is an additional constraint that A(tb,tf ,tp) should not know any information about m in information theoretic sense. The adversary can be either static or mobile. The connectivity requirement, phase complexity and communication complexity are three important parameters of any interactive PRMT/PSMT protocol and are well studied in the literature when the channels are controlled by a static/mobile Byzantine adversary. However, when the channels are controlled by mixed adversary A(tb,tf ,tp) , we encounter several surprising consequences. In this paper, we study the problem of PRMT and PSMT tolerating ”static/mobile mixed adversary”. We prove that even though the connectivity requirement for PRMT is same against both static and mobile mixed adversary, the lower bound on communication complexity for PRMT tolerating mobile mixed adversary is more than its static mixed counterpart. This is interesting because against only ”Byzantine adversary”, the connectivity requirement and the lower bound on the communication complexity of PRMT protocols are same for both static and mobile case. Thus our result shows that for PRMT, mobile mixed adversary is more powerful than its ∗Work supported by project No. CSE/05-06/076/DITX/CPAN on Protocols for Secure Communication and Computation sponsored by Department of Information Technology, Govt. of India. A phase is a send from S to R or vice-versa A static adversary corrupts the same set of channels in each phase of the protocol. The choice of the channel to corrupt is decided before the beginning of the protocol. A mobile adversary can corrupt different set of channels in different phases of the protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission Tolerating Static and Mobile Mixed Adversary

We study the fundamental problem of perfectly secure message transmission (PSMT), where two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as an undirected graph, a part of which may be under the influence of a malicious unbounded computational powerful adversary who can disrupt the communication in variety of ways. S intends to transmit a message ...

متن کامل

Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary

In this paper, we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the influence of an all powerful mobile Byzantine adversary. We design a three phase bit optimal PSMT protocol tolerating mobile adversary, whose communication complexity ma...

متن کامل

Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary

We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the influence of an all powerful mobile Byzantine adversary. In ACISP’2007 Srinathan et. al. has proved that the connectivity requirement for PSMT protocols is same for both static and mob...

متن کامل

Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary

In this paper we study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in a synchronous network, where S and R are connected by some vertex disjoint paths called wires such that each wire acts as a oneway channel facilitating communication either from S to R or vice-versa. Some of these wires may be corrupt...

متن کامل

Perfectly Secure Message Transmission Tolerating Mixed Adversary

In this paper, we study the issues related to the possibility, feasibility and optimality for perfectly secure message transmission (PSMT) in an undirected synchronous network, under the influence of a mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, fail-stop and passive fashion respectively. Specifically, we answer the following ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008