Perfectly Secure Message Transmission in Two Rounds
SPINI, Gabriele
Mathematisch Instituut Universiteit Leiden
Institut de Mathématiques de Bordeaux [IMB]
Centrum Wiskunde & Informatica [CWI]
Mathematisch Instituut Universiteit Leiden
Institut de Mathématiques de Bordeaux [IMB]
Centrum Wiskunde & Informatica [CWI]
SPINI, Gabriele
Mathematisch Instituut Universiteit Leiden
Institut de Mathématiques de Bordeaux [IMB]
Centrum Wiskunde & Informatica [CWI]
< Leer menos
Mathematisch Instituut Universiteit Leiden
Institut de Mathématiques de Bordeaux [IMB]
Centrum Wiskunde & Informatica [CWI]
Idioma
en
Communication dans un congrès
Este ítem está publicado en
Theory of Cryptography, Theory of Cryptography, Theory of Cryptography -- 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I, 2016-10-31, Beijing. 2016-08-05, vol. 9985, p. 286--304
Resumen en inglés
In the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t ...Leer más >
In the model that has become known as "Perfectly Secure Message Transmission"(PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately and reliably, i.e. in such a way that Eve will not get any information about the message while Bob will be able to recover it completely.In this paper, we focus on protocols that work in two transmission rounds for n= 2t+1. We break from previous work by following a conceptually simpler blueprint for achieving a PSMT protocol. We reduce the previously best-known communication complexity, i.e. the number of transmitted bits necessary to communicate a 1-bit secret, from O(n^3 log n) to O(n^2 log n). Our protocol also answers a question raised by Kurosawa and Suzuki and hitherto left open: their protocol reaches optimal transmission rate for a secret of size O(n^2 log n) bits, and the authors raised the problem of lowering this threshold. The present solution does this for a secret of O(n log n) bits.< Leer menos
Palabras clave en inglés
Perfectly Secure Message Transmission
Orígen
Importado de HalCentros de investigación