On perfectly secure communication over arbitrary networks

  • Authors:
  • M V N Ashwin Kumar;Pranava R. Goundan;K Srinathan;C. Pandu Rangan

  • Affiliations:
  • Indian Institute of Technology, Madras, Chennai-600036, INDIA;Indian Institute of Technology, Madras, Chennai-600036, INDIA;Indian Institute of Technology, Madras, Chennai-600036, INDIA;Indian Institute of Technology, Madras, Chennai-600036, INDIA

  • Venue:
  • Proceedings of the twenty-first annual symposium on Principles of distributed computing
  • Year:
  • 2002

Quantified Score

Hi-index 0.06

Visualization

Abstract

We study the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of generalized Byzantine adversaries. It is known that in the threshold adversary model, where the Byzantine adversary can corrupt upto any t among the n players (nodes), perfectly secure communication among any pair of players is possible if and only if the underlying synchronous network is (2t + 1)-connected. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure communication among any pair of players is possible if and only if the union of no two sets in the adversary structure is a vertex cutset of the synchronous network. The computation and communication complexities of the transmission protocol are polynomial in the size of the network and the maximal basis of the adversary structure.