1993
DOI: 10.1145/138027.138036
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly secure message transmission

Abstract: This paper studies the problem of perfectly secure communication in general network in which processors and communication lines may be faulty. Lower bounds are obtained on the connectivity required for successful secure communication. Efficient algorithms are obtained that operate with this connectivity and rely on no complexity-theoretic assumptions. These are the first algorithms for secure communication in a general network to simultaneously achieve the three goals of perfect secrecy, perfect resiliency, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
231
0
2

Year Published

1996
1996
2013
2013

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 326 publications
(239 citation statements)
references
References 4 publications
3
231
0
2
Order By: Relevance
“…There are some similarities between our protocol and that described by Dolev et al [17] for networks of processors with some faulty processors, in that both protocols use secret sharing as a means of protecting against nodes that deviate from the protocol. The protocols differ substantially with respect to the adversarial models they address.…”
Section: (A B) ∈ E(g))mentioning
confidence: 88%
“…There are some similarities between our protocol and that described by Dolev et al [17] for networks of processors with some faulty processors, in that both protocols use secret sharing as a means of protecting against nodes that deviate from the protocol. The protocols differ substantially with respect to the adversarial models they address.…”
Section: (A B) ∈ E(g))mentioning
confidence: 88%
“…The issue of possibility, feasibility and optimality in the context of PSMT in undirected synchronous networks has been completely resolved in [14,45,50,1,16,53,25,35]. However, all these works assume that the adversary can corrupt the nodes only in Byzantine fashion.…”
Section: Our Motivationmentioning
confidence: 99%
“…Following the approach of [14], we assume that any PSMT protocol operates as a sequence of phases, where a phase is a send from S to R or vice-versa. Moreover, since the network is synchronous, there exists a global clock and hence the transmission delay of each wire is fixed.…”
Section: Definition 3 (Byzantine Corruption [17]) a Node P Is Said Tmentioning
confidence: 99%
See 2 more Smart Citations