skip to main content
article
Free Access

Perfectly secure message transmission

Published:02 January 1993Publication History
Skip Abstract Section

Abstract

This paper studies the problem of perfectly secure communication in general network in which processors and communication lines may be faulty. Lower bounds are obtained on the connectivity required for successful secure communication. Efficient algorithms are obtained that operate with this connectivity and rely on no complexity-theoretic assumptions. These are the first algorithms for secure communication in a general network to simultaneously achieve the three goals of perfect secrecy, perfect resiliency, and worst-case time linear in the diameter of the network.

References

  1. 11 ~DWORK, C., PELEG, D., PIPPENGER, N., AND UPFAL, E. Fault tolerance in networks of ~bounded degree. SIAMJ. Comput. 17, 5 (1988), 975-988. Google ScholarGoogle Scholar
  2. 12 ~FELDMAN, P. Optimal algorithms for Byzantine agreement. Ph.D. dissertation, Department ~of mathematics, MIT, Cambridge, Mass., 1988.Google ScholarGoogle Scholar
  3. 13 ~ELDMAN, P., AND MICAL1, S. Optimal algorithms for Byzantine agreement. Proceedings of ~the 20th Annual ACM Symposium on Theory of Computing (Chicago, II1., May 2-4). ACM, New ~York, 1988, pp. 148-161. Google ScholarGoogle Scholar
  4. 14 ~FISCHER, M., LYNCH, N., AND MERRITT, M. Easy impossibility proofs for distributed consen- ~sus problems. J. Distrib. Compttt. } (1986), 26-39. Google ScholarGoogle Scholar
  5. 15 ~GALIL, Z., HABER, S., AND YUNG, M. Primitives for designing multiparty protocols from ~specifications. Manuscript, 1989.Google ScholarGoogle Scholar
  6. 16 ~OLDREICH, O., MICALI, S., AND WIGDERSON, A. How to play ANY mental game. In ~Proceedings of 19th Annual ACM Symposium on Theory of Computing (New York, N.Y., May ~25-27). ACM, New York, 1987, pp. 218-229. Google ScholarGoogle Scholar
  7. 17 ~KARL1N, A., AND YAO, h. Probabilistic lower bounds for Byzantine agreement. Manuscript.Google ScholarGoogle Scholar
  8. 18 ~McELIECE, R., AND SARWATE, D. On sharing secrets and Reed-Solomon codes. Commztn. ~ACM 24, 9 (Sept. 1981), 583-584. Google ScholarGoogle Scholar
  9. 19 ~RABIN, M., AND LEHMANN, D. On the advantages of free choice: A symmetric and fully ~distributed solution to the dining philosophers problem. In Proceedings' of the Symposium on ~Principles' of Programming Languages. 1981, pp. 133-138. Google ScholarGoogle Scholar
  10. 20 ~RABIN, T., AND BEN-OR, M. Verifiable secret sharing and multiparty protocols with honest ~majority. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing. (Seattle, ~Wash., May 15 17). ACM, New York, 1989, pp. 73-85. Google ScholarGoogle Scholar
  11. 21 ~SHAMIR, A. How to share a secret. Commtm. ACM 22, 6 (June 1979), 612-613. Google ScholarGoogle Scholar
  12. 22 ~YAO, A. How to generate and exchange secrets. In Proceedings of the 29th Sympostum on ~Foundations of Computer Science. IEEE, New York, 1986, pp. 162-167.Google ScholarGoogle Scholar

Index Terms

  1. Perfectly secure message transmission

      Recommendations

      Reviews

      Morrie Gasser

      Perfect security of communications as defined here refers to both secrecy and integrity of communications. In an environment with perfect security where a sender and receiver have some number n of wires with which to communicate, no adversary can learn anything about the data by observing any possible subset of s of those wires, and likewise no adversary can successfully disrupt communications by controlling any possibly unrelated subset of r of those wires. The authors claim to be the first to achieve perfect secrecy and integrity using an algorithm with a worst-case time linear in the diameter of the network. Past work has always resulted in a low-probability loss of integrity or secrecy. The paper explores the necessary relationships between s , r , and n , and then continues with a lengthy and highly mathematical discussion of the issues and the proposed algorithms, with a number of fairly complex proofs. While it is not clear whether the method has any practical benefit over others (considerations of practicability are well outside the scope of this paper), it appears to be an important theoretical result that should be mandatory reading for researchers in this field.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader