Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966978
|View full text |Cite
|
Sign up to set email alerts
|

Optimal message transmission protocols with flexible parameters

Abstract: In Secure message transmission (SMT) protocols two nodes in a network want to communicate securely, given that some of the nodes in the network are corrupted by an adversary with unlimited computational power. An SMT protocol uses multiple paths between the sender and a receiver to guarantee privacy and reliability of the message transmission. An (ϵ, δ)-SMT protocol bounds the adversary's success probability of breaking privacy and reliability to ε and δ, respectively. Rate optimal SMT protocols have the small… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…For this network our approach will need q ≥ 16000, q 4 computation, the list size will be q 3 and δ = 42 q 4 = 6(10 −6 ), where q is the base field size. For q = 16000, the δ for the protocol in [22] is 0.0263. whereas, δ for the protocol in [21] is not defined (the protocol needs larger field size). To have the same δ as our protocol, [21] needs field size to be 1.2 × 10 14 .…”
Section: Advantages Of the Approachmentioning
confidence: 99%
See 3 more Smart Citations
“…For this network our approach will need q ≥ 16000, q 4 computation, the list size will be q 3 and δ = 42 q 4 = 6(10 −6 ), where q is the base field size. For q = 16000, the δ for the protocol in [22] is 0.0263. whereas, δ for the protocol in [21] is not defined (the protocol needs larger field size). To have the same δ as our protocol, [21] needs field size to be 1.2 × 10 14 .…”
Section: Advantages Of the Approachmentioning
confidence: 99%
“…On the other hand, for N = (2 + c)t, c > 1 t , there are two optimal and efficient 1-round (0, δ)-SMT protocols [22,21]. The protocol of [21] uses two SMT protocols in two levels.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations