DOI: 10.1007/978-3-540-85093-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary

Abstract: In this paper, we study the issues related to the possibility, feasibility and optimality for perfectly secure message transmission (PSMT) in an undirected synchronous network, under the influence of a mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, fail-stop and passive fashion respectively. Specifically, we answer the following questions: (a) Possibility: Given a network and a mixed adversary, what is the necessary and sufficient condition for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…3. Adversary Behavior: The adversary may be static who corrupts the same channels throughout the protocol [12,31,36,19] or the adversary may be mobile, who corrupts different set of channels, during different stages of the protocol [39,26,5,27]. 4.…”
Section: Motivation and Different Models For Studying Psmtmentioning
confidence: 99%
“…3. Adversary Behavior: The adversary may be static who corrupts the same channels throughout the protocol [12,31,36,19] or the adversary may be mobile, who corrupts different set of channels, during different stages of the protocol [39,26,5,27]. 4.…”
Section: Motivation and Different Models For Studying Psmtmentioning
confidence: 99%
“…for r = 1 (Fitzi et al, 2007;Srinathan et al, 2007b) PSMT (Byzantine adversary) n ≥ 2t b + 1 for r ≥ 2 (Dolev et al, 1993) ( ) Srinathan, 2006) n ≥ 3t b + 2t o + t f + t p + 1 for r = 1 (Srinathan, 2006) ( ) Choudhury et al, 2008) ( ) Srinathan, 2006) Note: r denotes number of phases and ℓ denotes the message size in terms of field elements. …”
Section: Existing Literature In Threshold Adversarial Modelmentioning
confidence: 99%
“…In [2], the authors have studied PSMT tolerating mobile mixed adversary A mobile (t b ,t f ,tp) . In [2], it is shown that PSMT tol-…”
Section: Introductionmentioning
confidence: 99%
“…Any PSMT protocol, whose communication complexity (which is the number of field elements communicated by S and R throughout the protocol) satisfies this lower bound is called optimal PSMT (OPSMT). In [2], the authors have designed a nine phase OPSMT, which sends a message containing ℓ (ℓ = Ω(n)) field elements, by overall communicating O(nℓ) field elements over n = 2t b + t f + tp + 1 wires against A mobile (t b ,t f ,tp) . In this paper, we improve the existing OPSMT protocol of [2] by designing a three phase OPSMT protocol, having the same communication complexity as [2].…”
Section: Introductionmentioning
confidence: 99%