Patra et al. (IJACT '09) gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. They have left it as an open problem to design efficient protocol for almost perfectly secure message transmission, tolerating adversary structure. In this paper, we show the first single round almost perfectly secure message transmission protocol tolerating adversary structure. The computation and communication complexities of the protocol are both polynomial in the size of underlying linear secret sharing scheme (LSSS). This solves the open problem posed by Patra et al. When we restrict our general protocol to a threshold adversary, we obtain a single round, communication optimal almost secure message transmission protocol tolerating threshold adversary, which is much more computationally efficient and relatively simpler than the previous single round, communication optimal protocol of Srinathan et al. (PODC '08). © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Choudhury, A., Kurosawa, K., & Patra, A. (2011). Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversary. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6715 LNCS, pp. 292–308). https://doi.org/10.1007/978-3-642-21554-4_17
Mendeley helps you to discover research relevant for your work.