TY - GEN
T1 - Public discussion must be back and forth in secure message transmission
AU - Koshiba, Takeshi
AU - Sawada, Shinya
PY - 2011/9/20
Y1 - 2011/9/20
N2 - Secure message transmission (SMT) is a two-party protocol between a sender and a receiver over a network in which the sender and the receiver are connected by n disjoint channels and t out of n channels can be controlled by an adaptive adversary with unlimited computational resources. If a public discussion channel is available to the sender and the receiver to communicate with each other then a secure and reliable communication is possible even when n ≥ t + 1. The round complexity is one of the important measures for the efficiency for SMT. In this paper, we revisit the optimality and the impossibility for SMT with public discussion and discuss the limitation of SMT with the "unidirectional" public channel, where either the sender or the receiver can invoke the public channel, and show that the " bidirectional" public channel is necessary for SMT.
AB - Secure message transmission (SMT) is a two-party protocol between a sender and a receiver over a network in which the sender and the receiver are connected by n disjoint channels and t out of n channels can be controlled by an adaptive adversary with unlimited computational resources. If a public discussion channel is available to the sender and the receiver to communicate with each other then a secure and reliable communication is possible even when n ≥ t + 1. The round complexity is one of the important measures for the efficiency for SMT. In this paper, we revisit the optimality and the impossibility for SMT with public discussion and discuss the limitation of SMT with the "unidirectional" public channel, where either the sender or the receiver can invoke the public channel, and show that the " bidirectional" public channel is necessary for SMT.
KW - public discussion
KW - round complexity
KW - secure message transmission
UR - http://www.scopus.com/inward/record.url?scp=80052809833&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052809833&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24209-0_22
DO - 10.1007/978-3-642-24209-0_22
M3 - Conference contribution
AN - SCOPUS:80052809833
SN - 9783642242083
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 325
EP - 337
BT - Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers
T2 - 13th International Conference on Information Security and Cryptology, ICISC 2010
Y2 - 1 December 2010 through 3 December 2010
ER -