Perfectly reliable and secure message transmission tolerating mobile adversary (Q1017544): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Removed claim: author (P16): Item:Q635381 |
||
Property / author | |||
Property / author: Ashish Choudhury / rank | |||
Revision as of 05:52, 20 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Perfectly reliable and secure message transmission tolerating mobile adversary |
scientific article |
Statements
Perfectly reliable and secure message transmission tolerating mobile adversary (English)
0 references
12 May 2009
0 references
Summary: We study the problem of perfectly reliable message transmission (PRMT) and perfectly secure message transmission (PSMT) in an undirected synchronous network tolerating an all powerful threshold mobile Byzantine adversary. Specifically, we show that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols. We also characterise PSMT in directed networks tolerating mobile adversary. All existing PRMT and PSMT protocols abstract the paths between the sender and the receiver as wires, neglecting the intermediate nodes in the paths, thus causing significant over estimation in the communication and round complexity of protocols. Here, we consider the underlying paths as a whole instead of abstracting them as wires and derive a tight bound on the number of rounds required to achieve reliable communication tolerating a threshold mobile adversary with arbitrary roaming speed. Finally, we briefly study PRMT and PSMT protocols in the presence of non-threshold mobile Byzantine adversary. Even though the characterisation for PRMT/PSMT is shown to be same against both threshold static and threshold mobile adversary (in this article), we show that the characterisation for PRMT/PSMT against non-threshold static and non-threshold mobile adversary are not same.
0 references
communication efficiency
0 references
information theoretic security
0 references
mobile adversary
0 references
unbounded computing power
0 references
reliability
0 references
message transmission
0 references
undirected synchronous networks
0 references
mobility
0 references
threshold adversary
0 references
cryptography
0 references