Unconditionally Reliable Message Transmission in Directed Hypergraphs
نویسندگان
چکیده
We study the problem of unconditionally reliable message transmission (URMT), where two non-faulty players, the sender S and the receiver R are part of a synchronous network modeled as a directedhypergraph, a part of which may be under the influence of an adversary having unbounded computingpower. S intends to transmit a message m to R, such that R should correctly obtain S’s message withprobability at least (1 − δ) for arbitrarily small δ > 0. However, unlike most of the literature on thisproblem, we assume the adversary modeling the faults is threshold mixed, and can corrupt differentset of nodes in Byzantine, passive and fail-stop fashion simultaneously. The main contribution of thiswork is the complete characterization of URMT in directed hypergraph tolerating such an adversary.Working out a direct characterization of URMT over directed hypergraphs tolerating threshold mixedadversary is highly un-intuitive. So we first propose a novel technique, which takes as input a di-rected hypergraph and a threshold mixed adversary on that hypergraph and outputs a correspondingdigraph, along with a non-threshold mixed adversary, such that URMT over the hypergraph tolerat-ing the threshold mixed adversary is possible iff a special type of URMT is possible over the obtaineddigraph, tolerating the corresponding non-threshold mixed adversary. We then characterize URMT inarbitrary digraphs tolerating non-threshold mixed adversary and modify it to obtain the characteriza-tion for special type of URMT over digraphs tolerating non-threshold mixed adversary. This completesthe characterization of URMT over the original hypergraph. Surprisingly, our results indicate thateven passive corruption, in collusion with active faults, substantially affects the reliability of URMTprotocols! This is interesting because it is a general belief that passive corruption (eavesdropping)does not affect reliable communication.
منابع مشابه
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
In this paper, we re-visit the problem of unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in a directed network under the presence of a threshold adaptive Byzantine adversary, having unbounded computing power. Desmedt et.al [5] have given the necessary and sufficient condition for the existence of URMT and USMT protocols in directed ne...
متن کاملUnconditionally Reliable Message Transmission in Directed Neighbour Networks
The problem of unconditionally reliable message transmission (URMT) is to design a protocol which when run by players in a network enables a sender s to deliver a message to a receiver r with high probability, even when some players in the network are under the control of an unbounded adversary. Renault and Tomala [JoC2008] gave a characterization of undirected neighbour networks over which URM...
متن کاملMinimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
In this paper we give the minimal connectivity required in a synchronous directed network, which is under the influence of a computationally unbounded Byzantine adversary that can corrupt a subset of nodes, so that Secure Message Transmission is possible between sender S and receiver R. We also show that secure communication between a pair of nodes in a given synchronous directed network is pos...
متن کاملInterplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
We consider the distributed setting where a subset of nodes are under the control of a malicious adversary with unbounded computational power. The problem of simulating a directed reliable channel from a sender S to a receiver R in the absence of a true physical point to point channel is fundamental to the area of Distributed Computing and is popularly known as ‘Unconditionally Reliable Message...
متن کاملDirected domination in oriented hypergraphs
ErdH{o}s [On Sch"utte problem, Math. Gaz. 47 (1963)] proved that every tournament on $n$ vertices has a directed dominating set of at most $log (n+1)$ vertices, where $log$ is the logarithm to base $2$. He also showed that there is a tournament on $n$ vertices with no directed domination set of cardinality less than $log n - 2 log log n + 1$. This notion of directed domination number has been g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008