Perfectly reliable and secure message transmission tolerating mobile adversary (Q1017544)

From MaRDI portal
Revision as of 19:54, 10 July 2023 by Importer (talk | contribs) (‎Created a new Item)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
scientific article
Language Label Description Also known as
English
Perfectly reliable and secure message transmission tolerating mobile adversary
scientific article

    Statements

    Perfectly reliable and secure message transmission tolerating mobile adversary (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    12 May 2009
    0 references
    Summary: We study the problem of perfectly reliable message transmission (PRMT) and perfectly secure message transmission (PSMT) in an undirected synchronous network tolerating an all powerful threshold mobile Byzantine adversary. Specifically, we show that the mobility of the threshold adversary does not affect the possibility and optimality of PRMT and PSMT protocols. We also characterise PSMT in directed networks tolerating mobile adversary. All existing PRMT and PSMT protocols abstract the paths between the sender and the receiver as wires, neglecting the intermediate nodes in the paths, thus causing significant over estimation in the communication and round complexity of protocols. Here, we consider the underlying paths as a whole instead of abstracting them as wires and derive a tight bound on the number of rounds required to achieve reliable communication tolerating a threshold mobile adversary with arbitrary roaming speed. Finally, we briefly study PRMT and PSMT protocols in the presence of non-threshold mobile Byzantine adversary. Even though the characterisation for PRMT/PSMT is shown to be same against both threshold static and threshold mobile adversary (in this article), we show that the characterisation for PRMT/PSMT against non-threshold static and non-threshold mobile adversary are not same.
    0 references
    communication efficiency
    0 references
    information theoretic security
    0 references
    mobile adversary
    0 references
    unbounded computing power
    0 references
    reliability
    0 references
    message transmission
    0 references
    undirected synchronous networks
    0 references
    mobility
    0 references
    threshold adversary
    0 references
    cryptography
    0 references

    Identifiers