Patra et al. [25] gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols 4 tolerating general, non-threshold 2 adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. Moreover, they have left it as an open problem to design efficient protocol for almost perfectly secure message transmission, tolerating 2 adversary structure. In this paper, we show the first single round almost perfectly secure message transmission protocol tolerating 2 adversary structure. The computation and communication complexities of the protocol are both polynomial in the size of underlying linear secret sharing scheme (LSSS) and adversary structure. This solves the open problem raised in [25]. When we restrict our general protocol to threshold adversary with = 2 + 1, we obtain a single round, communication optimal almost secure message transmission protocol tolerating threshold adversary, which is much more computationally efficient and relatively simpler than the previous communication optimal protocol of [35].