2018
DOI: 10.1007/978-3-030-01554-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly Secure Message Transmission Against Rational Timid Adversaries

Abstract: Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the sender can securely and reliably transmit messages to the receiver using multiple channels. An adversary for SMT can corrupt a subset of the channels and make eavesdropping and tampering over the channels. In this work, we introduce a game-theoretic security model for SMT in which adversaries have some preferences for the protocol execution. We define rational "timid" adversaries who prefer to violate the security requirements… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 41 publications
0
3
0
Order By: Relevance
“…Next, we study the setting in which multiple timid adversaries may corrupt all the channels. More specifically, 1 The papers studied more general problems of secure network coding. By considering a simple n-link network as in SMT and assuming the adversary who eavesdrops and tampers with the same links, the coding schemes of [33], [7], [34] give constructions of almost-reliable SMT protocols for t < n/2.…”
Section: A Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Next, we study the setting in which multiple timid adversaries may corrupt all the channels. More specifically, 1 The papers studied more general problems of secure network coding. By considering a simple n-link network as in SMT and assuming the adversary who eavesdrops and tampers with the same links, the coding schemes of [33], [7], [34] give constructions of almost-reliable SMT protocols for t < n/2.…”
Section: A Our Resultsmentioning
confidence: 99%
“…|M| , suc = 0, and detect = 0; • u 2 is the utility when Pr[guess = 1] = 1 |M| , suc = 1, and detect = 0; • u 3 is the utility when Pr[guess = 1] = 1 |M| , suc = 0, and detect = 1; • u 4 is the utility when Pr[guess = 1] = 1 |M| , suc = 1, and detect = 1.…”
Section: Timid Adversariesmentioning
confidence: 99%
See 1 more Smart Citation