Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality

نویسندگان

  • K. Srinathan
  • Arpita Patra
  • Ashish Choudhury
  • C. Pandu Rangan
چکیده

In this paper, we study the problem of probabilistic perfectly reliable message transmission (PPRMT) and probabilistic perfectly secure message transmission (PPSMT) between a sender S and a receiver R in a synchronous network, where S and R are connected by n vertex disjoint paths called wires. Some of these n wires may be corrupted by a mixed adversary (tb, to, tf , tp), having unbounded computing power, who can corrupt tb, to, tf , tp wires in Byzantine, omission, failstop and passive fashion respectively. In spite of the presence of such an adversary, S wants to send a message to R such that after exchanging messages in phases, R should correctly receive S’s message with high probability (probability ≥ 1 − δ, for any 0 < δ < 1/2) and the adversary should have no information about S’s message. We prove the necessary and sufficient condition for the existence of PPRMT and PPSMT protocols tolerating mixed adversary. We give the lower bound on the communication complexity of PPRMT and PPSMT protocols in the presence of mixed adversary and design bit-optimal PPRMT protocol and PPSMT protocols. We also compare our results with the existing results for perfectly reliable message transmission (PRMT), perfectly secure message transmission (PSMT), PPRMT and PPSMT and show that randomness and probabilistic approaches lead to improved communication, phase and computational complexities. Moreover results on mixed adversaries reveal higher level of fault tolerance available in the underlying network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality

We study the interplay of network connectivity and the issues related to the possibility, feasibility and optimality for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adaptive mixed adversary A(tb,to,tf ,tp), who has unbounded computing power and can corrupt up to tb, to...

متن کامل

Perfectly Secure Message Transmission Tolerating Mixed Adversary

In this paper, we study the issues related to the possibility, feasibility and optimality for perfectly secure message transmission (PSMT) in an undirected synchronous network, under the influence of a mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, fail-stop and passive fashion respectively. Specifically, we answer the following ...

متن کامل

Network Connection and Perfectly Secure Message Transmission on Wireless Mobile Networks

In this paper we proposed perfectly secure message transmission for reliable and secure communications in order to ensure that an adversary cannot obtain information (in the information theoretic sense) about messages. There are numerous studies about the interplay of network connectivity and perfectly secure message transmission under a Byzantine adversary capable of corrupting up to t players...

متن کامل

Perfectly Reliable Message Transmission

We consider the problem of reliable message transmission between two synchronous players connected by n wires, some t < n/2 of which may be faulty. We show how to get reliability “for free”—reliable transmission of b bits involves a total communication of only O(b) bits, when b is large enough. We also construct an efficient Perfectly Secure Message Transmission Protocol. © 2006 Elsevier B.V. A...

متن کامل

Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary

Patra et al. [25] gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold Q adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. Moreover, they have left it as an open...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007