Optimal secure message transmission by public discussion

  • Authors:
  • Hongsong Shi;Shaoquan Jiang;Reihaneh Safavi-Naini;Mohammed Ashraful Tuhin

  • Affiliations:
  • School of Computer Science & Engineering, University of Electronic Science and Technology of China, ChengDu, China and Department of Computer Science, University of Calgary, Calgary, Canada;School of Computer Science & Engineering, University of Electronic Science and Technology of China, ChengDu, China and Department of Computer Science, University of Calgary, Calgary, Canada;Department of Computer Science, University of Calgary, Calgary, Canada;Department of Computer Science, University of Calgary, Calgary, Canada

  • Venue:
  • ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Secure message transmission assumes n channels between a sender and a receiver such that up to t channels are under the control of a computationally unlimited adversary. In secure message transmission by public discussion protocol, sender and receiver have access to a public authenticated channel. In this paper we show that if n ≥ t + 1, a secure protocol requires at least 3 rounds of communication and 2 rounds invocation of the public channel. This gives a complete answer to a question raised by Garay and Ostrovsky in Eurocrypt 2008. We also describe a round optimal protocol that has constant transmission rate over the public channel.