Perfectly Secure Message Transmission in Two Rounds

被引:7
|
作者
Spini, Gabriele [1 ,2 ,3 ]
Zemor, Gilles [1 ]
机构
[1] Univ Bordeaux, Inst Math Bordeaux, UMR 5251, 351 Cours Liberat, F-33400 Talence, France
[2] Leiden Univ, Math Inst, Leiden, Netherlands
[3] CWI Amsterdam, Amsterdam, Netherlands
来源
关键词
Perfectly Secure Message Transmission; SCHEME;
D O I
10.1007/978-3-662-53641-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the model that has become known as "Perfectly Secure Message Transmission" (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately and reliably, i.e. in such a way that Eve will not get any information about the message while Bob will be able to recover it completely. In this paper, we focus on protocols that work in two transmission rounds for n = 2t + 1. We break from previous work by following a conceptually simpler blueprint for achieving a PSMT protocol. We reduce the previously best-known communication complexity, i.e. the number of transmitted bits necessary to communicate a 1-bit secret, from O(n(3) log n) to O( n(2) log n). Our protocol also answers a question raised by Kurosawa and Suzuki and hitherto left open: their protocol reaches optimal transmission rate for a secret of size O(n(2) log n) bits, and the authors raised the problem of lowering this threshold. The present solution does this for a secret of O(n log n) bits.
引用
收藏
页码:286 / 304
页数:19
相关论文
共 50 条
  • [21] Constant phase bit optimal protocols for perfectly reliable and secure message transmission
    Patra, Arpita
    Choudhary, Ashish
    Srinathan, K.
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 221 - +
  • [22] Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
    Kurosawa, Kaoru
    Suzuki, Kazuhiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (11) : 5223 - 5232
  • [23] Truly efficient 2-round perfectly secure message transmission scheme
    Kurosawa, Kaoru
    Suzuki, Kazuhiro
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 324 - +
  • [24] Perfectly Reliable Message Transmission
    Narayanan, Arvind
    Srinathan, K.
    Rangan, C. Pandu
    INFORMATION PROCESSING LETTERS, 2006, 100 (01) : 23 - 28
  • [25] Perfectly secure message transmission in directed networks tolerating threshold and non threshold adversary
    Patra, Arpita
    Shankar, Bhavani
    Choudhary, Ashish
    Srinathan, K.
    Rangan, C. Pandu
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 80 - +
  • [26] Round-efficient perfectly secure message transmission scheme against general adversary
    Kaoru Kurosawa
    Designs, Codes and Cryptography, 2012, 63 : 199 - 207
  • [27] Round-efficient perfectly secure message transmission scheme against general adversary
    Kurosawa, Kaoru
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 63 (02) : 199 - 207
  • [28] Brief Announcement: Perfectly Secure Message Transmission in Directed Networks Re-Visited
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    PODC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2009, : 278 - 279
  • [29] Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
    Choudhury, Ashish
    Kurosawa, Kaoru
    Patra, Arpita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 292 - 308
  • [30] Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversary
    Applied Statistics Unit, Indian Statistical Institute Kolkata India, India
    不详
    不详
    Lect. Notes Comput. Sci., (292-308):