2010
DOI: 10.1504/ijact.2010.038309
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality

Abstract: Abstract:We study the interplay of network connectivity and the issues related to the 'possibility', 'feasibility' and 'optimality' for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adaptive mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, omission, fail-stop and passive fashion respectively. We consider two types of advers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
46
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 31 publications
(46 citation statements)
references
References 55 publications
0
46
0
Order By: Relevance
“…Another problem that is closely related to ours is that of Secure Message Transmission (SMT) [14], [15]. Under SMT, a sender aims to communicate a message reliably and secretly to the receiver over multiple parallel links out of which a fraction of links are eavesdropped and another (possibly intersecting) fraction are jammed.…”
Section: Related Workmentioning
confidence: 99%
“…Another problem that is closely related to ours is that of Secure Message Transmission (SMT) [14], [15]. Under SMT, a sender aims to communicate a message reliably and secretly to the receiver over multiple parallel links out of which a fraction of links are eavesdropped and another (possibly intersecting) fraction are jammed.…”
Section: Related Workmentioning
confidence: 99%
“…This protocol uses a complex combination of secret sharing by the sender and elaborate verification of the received information by the receiver to determine the correct message block. There are two optimal and efficient 1-round (0, δ)-SMT protocols for N = 2t + 1 [14,22]. The protocol in [14] is based on the 1-round δ-RMT protocol of [18] and has similar complexity.…”
Section: Related Workmentioning
confidence: 99%
“…There are two optimal and efficient 1-round (0, δ)-SMT protocols for N = 2t + 1 [14,22]. The protocol in [14] is based on the 1-round δ-RMT protocol of [18] and has similar complexity. Moreover, to achieve the optimal transmission rate for higher connectivity, this protocol can not be directly used as the encrypted message blocks are broadcasted.…”
Section: Related Workmentioning
confidence: 99%
“…However, the results presented in [38] holds only for the protocols, having a negligible error probability in reliability; i.e., the reliability is not perfect reliability 8 . As far our knowledge is concerned, nobody has ever addressed the issue of possibility, feasibility and optimality in the context of PSMT in undirected synchronous networks, tolerating mixed adversary.…”
Section: Our Motivationmentioning
confidence: 97%
“…Motivated by the need to study mixed adversary in the context of secure message transmission, the authors in [38] have recently studied the issues related to possibility, feasibility and optimality in the context of reliable and secure message transmission in the presence of a mixed adversary, who can corrupt disjoint sets of t b , t f and t p nodes in Byzantine, fail-stop and passive fashion respectively. However, the results presented in [38] holds only for the protocols, having a negligible error probability in reliability; i.e., the reliability is not perfect reliability 8 .…”
Section: Our Motivationmentioning
confidence: 99%