Title :
Optimal secure message transmission by public discussion
Author :
Shi, Hongsong ; Jiang, Shaoquan ; Safavi-Naini, Reihaneh ; Tuhin, M.A.
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
fDate :
June 28 2009-July 3 2009
Abstract :
Secure message transmission assumes n channels between a sender and a receiver such that up to t channels are under the control of a computationally unlimited adversary. In secure message transmission by public discussion protocol, sender and receiver have access to a public authenticated channel. In this paper we show that if n ¿ t + 1, a secure protocol requires at least 3 rounds of communication and 2 rounds invocation of the public channel. This gives a complete answer to a question raised by Garay and Ostrovsky in Eurocrypt 2008. We also describe a round optimal protocol that has constant transmission rate over the public channel.
Keywords :
cryptographic protocols; telecommunication channels; telecommunication security; optimal secure message transmission; public authenticated channel; public discussion protocol; Access protocols; Broadcasting; Computer science; Optimal control; Privacy; Security; Surface-mount technology; Telecommunication network reliability; Upper bound; Wires;
Conference_Titel :
Information Theory, 2009. ISIT 2009. IEEE International Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-4312-3
Electronic_ISBN :
978-1-4244-4313-0
DOI :
10.1109/ISIT.2009.5205936