

Author: Patra Arpita
Publisher: Inderscience Publishers
ISSN: 1753-0563
Source: International Journal of Applied Cryptography, Vol.2, Iss.2, 2010-01, pp. : 159-197
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
We study the interplay of network connectivity and the issues related to the 'possibility', 'feasibility' and 'optimality' for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected synchronous network, under the influence of an adaptive mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, omission, fail-stop and passive fashion respectively. We consider two types of adversary, namely threshold and non-threshold. One of the important conclusions we arrive at from our study is that allowing a negligible error probability significantly helps in the 'possibility', 'feasibility' and 'optimality' of both reliable and secure message transmission protocols. To design our protocols, we propose several new techniques which are of independent interest.
Related content






Secure collaborations over message boards
By Ramkumar Mahalingam Memon Nasir
International Journal of Security and Networks, Vol. 1, Iss. 1-2, 2006-09 ,pp. :


Secure Group Message Transfer Stegosystem
International Journal of Information Security and Privacy (IJISP), Vol. 9, Iss. 4, 2015-10 ,pp. :