Secure Message Transmission in Asynchronous Directed Graphs

We study the problem of secure message transmission (SMT) in asynchronous directed graphs, where an unbounded Byzantine adversary can corrupt some subset of nodes specified via an adversary structure. We focus on the particular variant (0, δ )-SMT, where the message remains perfectly private, but there is a small chance that the receiver R may not obtain it. This variant can be of two kinds: Monte Carlo - where R may output an incorrect message with small probability; and Las Vegas - where R never outputs an incorrect message. For a Monte Carlo (0, δ )-SMT protocol to exist in an asynchronous directed graph, we show that the minimum connectivity required in the network does not decrease even when privacy of the message being transmitted is not required. In the case of Las Vegas (0, δ )-SMT, we show that the minimum connectivity required matches exactly with the minimum connectivity requirements of the zero-error variant of SMT --- (0, 0)-SMT. For a network that meets the minimum connectivity requirements, we provide a protocol efficient in the size of the graph and the adversary structure. We also provide a protocol efficient in the size of the graph for an important family of graphs, when the adversary structure is threshold.

[1]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[2]  Moti Yung,et al.  Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[3]  C. Pandu Rangan,et al.  On Communication Complexity of Secure Message Transmission in Directed Networks , 2010, ICDCN.

[4]  Ueli Maurer,et al.  Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  K. Srinathan,et al.  Possibility and complexity of probabilistic reliable communication in directed networks , 2006, PODC '06.

[7]  K. Srinathan,et al.  Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks , 2011, ICITS.

[8]  Matthew K. Franklin,et al.  Secure hypergraphs: privacy from partial broadcast , 1995, STOC '95.

[9]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[10]  Yvo Desmedt,et al.  Cryptanalysis of Secure Message Transmission Protocols with Feedback , 2009, ICITS.

[11]  Matthew K. Franklin,et al.  Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.

[12]  Information Security and Privacy , 1996, Lecture Notes in Computer Science.

[13]  K. Srinathan,et al.  Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary , 2007, DISC.

[14]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.

[15]  K. Srinathan,et al.  On perfectly secure communication over arbitrary networks , 2002, PODC '02.

[16]  Yongge Wang,et al.  Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.

[17]  Ronald Cramer,et al.  Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.

[18]  Kaoru Kurosawa,et al.  Truly efficient 2-round perfectly secure message transmission scheme , 2009, IEEE Trans. Inf. Theory.

[19]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[20]  Marcos K. Aguilera,et al.  Distributed Computing and Networking , 2011, Lecture Notes in Computer Science.

[21]  K. Srinathan,et al.  Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT , 2010, DISC.

[22]  K. Srinathan,et al.  On Proactive Perfectly Secure Message Transmission , 2007, ACISP.

[23]  C. Pandu Rangan,et al.  Constant phase efficient protocols for secure message transmission in directed networks , 2007, PODC '07.

[24]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[25]  Aggelos Kiayias,et al.  Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.

[26]  Hosame Abu-Amara,et al.  Perfectly secure message transmission in asynchronous networks , 1995, Proceedings.Seventh IEEE Symposium on Parallel and Distributed Processing.

[27]  C. Pandu Rangan,et al.  Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited , 2008, SCN.

[28]  K. Srinathan,et al.  Unconditionally reliable message transmission in directed networks , 2008, SODA '08.

[29]  Yongge Wang,et al.  Robust key establishment in sensor networks , 2004, SGMD.

[30]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1985, JACM.

[31]  K. Srinathan,et al.  Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.

[32]  Cynthia Dwork,et al.  Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.

[33]  K. Srinathan,et al.  On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks , 2009, ICDCN.