Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity

In the Secure Message Transmission (SMT) problem, a sender \(\mathcal{S}\) wants to send a message m to a receiver \(\mathcal{R}\) in a private and reliable way. \(\mathcal{S}\) and \(\mathcal{R}\) are connected by nwires, t of which controlled by the adversary. The n wires represent n node disjoint communication paths between the sender and the receiver. The adversary is assumed to have unlimited computational power. An Almost Perfectly Secure Message Transmission (APSMT, for short) provides perfect privacy for the transmitted message, and the probability that the received message is different from the sent one is bounded by δ and, δ = 0 corresponds to perfect SMT. It has been shown that APSMT is possible if n ≥ 2t + 1 and for 1-round perfect SMT, n ≥ 3t + 1. SMT protocols and techniques have found applications in practice, including key distribution and key strengthening in wireless sensor networks. In this paper we show two general methods of constructing 1-round APSMT protocols for different levels of network connectivity. We consider two cases: \(n = (2 + c)t,c > \frac{1} {t}\) where a fraction of wires are corrupted, and \(n = 2t + k,k \geq 1\) where a constant number of extra wires (over the required minimum) exists. The proposed methods use the whole, or part of, the previously constructed protocols to construct new protocols with flexible connectivity, whose privacy, reliability and efficiency can be derived from the component parts. The new protocols are efficient and in some cases have optimal transmission rates. The flexibility that is provided by these constructions facilitate application of APSMT in practical applications.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Yunghsiang Sam Han,et al.  Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission , 2008, IEEE Transactions on Dependable and Secure Computing.

[3]  Toshinori Araki Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption , 2008, ICITS.

[4]  Don Coppersmith,et al.  Matrix multiplication via arithmetic progressions , 1987, STOC.

[5]  Reihaneh Safavi-Naini,et al.  Optimal message transmission protocols with flexible parameters , 2011, ASIACCS '11.

[6]  Gabriel Bracha,et al.  An O(log n) expected rounds randomized byzantine generals protocol , 1987, JACM.

[7]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.

[8]  Matthew K. Franklin,et al.  Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.

[9]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[10]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[11]  Jiang Wu,et al.  Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission , 2011, IEEE Transactions on Dependable and Secure Computing.

[12]  Kaoru Kurosawa,et al.  Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme , 2009, IEEE Transactions on Information Theory.

[13]  K. Srinathan,et al.  Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.

[14]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[15]  Yongge Wang,et al.  Robust key establishment in sensor networks , 2004, SGMD.

[16]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  S. Varadhan,et al.  A probabilistic approach to , 1974 .

[18]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[19]  Reihaneh Safavi-Naini,et al.  Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes , 2010, AFRICACRYPT.

[20]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[21]  Deep Medhi,et al.  A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[22]  Kaoru Kurosawa,et al.  Almost Secure (1-Round, n-Channel) Message Transmission Scheme , 2009, ICITS.

[23]  K. Srinathan,et al.  Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality , 2010, Int. J. Appl. Cryptogr..

[24]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[25]  Matthias Fitzi,et al.  Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.

[26]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[27]  Hosame Abu-Amara,et al.  Efficient Perfectly Secure Message Transmission in Synchronous Networks , 1996, Inf. Comput..

[28]  Ronald Cramer,et al.  Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.

[29]  Reihaneh Safavi-Naini,et al.  Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper) , 2011, Financial Cryptography.