Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Perfectly secure message transmission
Journal of the ACM (JACM)
Decoding of Reed Solomon codes beyond the error-correction bound
Journal of Complexity
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Information Theoretic Security
Towards optimal and efficient perfectly secure message transmission
TCC'07 Proceedings of the 4th conference on Theory of cryptography
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
International Journal of Applied Cryptography
Optimal message transmission protocols with flexible parameters
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Linear-Algebraic List Decoding of Folded Reed-Solomon Codes
CCC '11 Proceedings of the 2011 IEEE 26th Annual Conference on Computational Complexity
IEEE Transactions on Dependable and Secure Computing
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Optimal one round almost perfectly secure message transmission (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Explicit Codes Achieving List Decoding Capacity: Error-Correction With Optimal Redundancy
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In Secure Message Transmission (SMT) problem, a sender $\cal S$ is connected to a receiver $\cal R$ through N node disjoint bidirectional paths in the network, t of which are controlled by an adversary with unlimited computational power. $\cal{S}$ wants to send a message m to $\cal{R}$ in a reliable and private way. It is proved that SMT is possible if and only if N≥2t+1. In Reliable Message Transmission (RMT) problem, the network setting is the same and the goal is to provide reliability for communication, only. In this paper we focus on 1-round δ-RMT and (0,δ)-SMT where the chance of protocol failure (receiver cannot decode the sent message) is at most δ, and in the case of SMT, privacy is perfect. We propose a new approach to the construction of 1-round δ-RMT and (0, δ)-SMT for all connectivities N≥2t+1, using list decodable codes and message authentication codes. Our concrete constructions use folded Reed-Solomon codes and multireceiver message authentication codes. The protocols have optimal transmission rates and provide the highest reliability among all known comparable protocols. Important advantages of these constructions are, (i) they can be adapted to all connectivities, and (ii) have simple and direct security (privacy and reliability) proofs using properties of the underlying codes, and δ can be calculated from parameters of the underlying codes. We discuss our results in relation to previous work in this area and propose directions for future research.