Message Transmission

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Kazuhiro Suzuki - One of the best experts on this subject based on the ideXlab platform.

  • truly efficient 2 round perfectly secure Message Transmission scheme
    International Cryptology Conference, 2008
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    In themodel of perfectly secureMessage Transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe and forge) the Messages sent through t out of n channels. The sender wishes to send a secret s to the receiver perfectly privately and perfectly reliably without sharing any key with the receiver. In this paper, we show the first 2-round PSMT for n = 2t + 1 such that not only the Transmission rate is O(n) but also the computational costs of the sender and the receiver are both polynomial in n. This means that we solve the open problem raised by Agarwal, Cramer and de Haan at CRYPTO 2006.

  • truly efficient 2 round perfectly secure Message Transmission scheme
    IACR Cryptology ePrint Archive, 2008
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    In the model of perfectly secure Message Transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe and forge) the Messages sent through t out of n channels. The sender wishes to send a secret s to the receiver perfectly privately and perfectly reliably without sharing any key with the receiver. In this paper, we show the first 2-round PSMT for n = 2t+ 1 such that not only the Transmission rate is O(n) but also the computational costs of the sender and the receiver are both polynomial in n. This means that we solve the open problem raised by Agarwal, Cramer and de Haan at CRYPTO 2006. The main novelty of our approach is to introduce a notion of pseudobasis to the coding theory. It will be an independent interest for coding theory, too.

  • almost secure 1 round n channel Message Transmission scheme
    IACR Cryptology ePrint Archive, 2007
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    It is known that perfectly secure (1-round, n-channel) Message Transmission (MT) schemes exist if and only if n ≥ 3t + 1, where t is the number of channels that the adversary can corrupt. Then does there exist an almost secure MT scheme for n = 2t + 1 ? In this paper, we first sum up a number flaws of the previous almost secure MT scheme presented at Crypto 2004 . We next show an equivalence between almost secure MT schemes and secret sharing schemes with cheaters. By using our equivalence, we derive a lower bound on the communication complexity of almost secure MT schemes. Finally, we present a near optimum scheme which meets our bound approximately. This is the first construction of provably secure almost secure (1-round, n-channel) MT schemes for n = 2t + 1.

Ning Cai - One of the best experts on this subject based on the ideXlab platform.

Kaoru Kurosawa - One of the best experts on this subject based on the ideXlab platform.

  • truly efficient 2 round perfectly secure Message Transmission scheme
    International Cryptology Conference, 2008
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    In themodel of perfectly secureMessage Transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe and forge) the Messages sent through t out of n channels. The sender wishes to send a secret s to the receiver perfectly privately and perfectly reliably without sharing any key with the receiver. In this paper, we show the first 2-round PSMT for n = 2t + 1 such that not only the Transmission rate is O(n) but also the computational costs of the sender and the receiver are both polynomial in n. This means that we solve the open problem raised by Agarwal, Cramer and de Haan at CRYPTO 2006.

  • truly efficient 2 round perfectly secure Message Transmission scheme
    IACR Cryptology ePrint Archive, 2008
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    In the model of perfectly secure Message Transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe and forge) the Messages sent through t out of n channels. The sender wishes to send a secret s to the receiver perfectly privately and perfectly reliably without sharing any key with the receiver. In this paper, we show the first 2-round PSMT for n = 2t+ 1 such that not only the Transmission rate is O(n) but also the computational costs of the sender and the receiver are both polynomial in n. This means that we solve the open problem raised by Agarwal, Cramer and de Haan at CRYPTO 2006. The main novelty of our approach is to introduce a notion of pseudobasis to the coding theory. It will be an independent interest for coding theory, too.

  • almost secure 1 round n channel Message Transmission scheme
    IACR Cryptology ePrint Archive, 2007
    Co-Authors: Kaoru Kurosawa, Kazuhiro Suzuki
    Abstract:

    It is known that perfectly secure (1-round, n-channel) Message Transmission (MT) schemes exist if and only if n ≥ 3t + 1, where t is the number of channels that the adversary can corrupt. Then does there exist an almost secure MT scheme for n = 2t + 1 ? In this paper, we first sum up a number flaws of the previous almost secure MT scheme presented at Crypto 2004 . We next show an equivalence between almost secure MT schemes and secret sharing schemes with cheaters. By using our equivalence, we derive a lower bound on the communication complexity of almost secure MT schemes. Finally, we present a near optimum scheme which meets our bound approximately. This is the first construction of provably secure almost secure (1-round, n-channel) MT schemes for n = 2t + 1.

Dennis Brandao - One of the best experts on this subject based on the ideXlab platform.

  • review a gradient based routing scheme for street lighting wireless sensor networks
    Journal of Network and Computer Applications, 2013
    Co-Authors: Rodrigo Palucci Pantoni, Dennis Brandao
    Abstract:

    Routing for wireless sensor networks based on gradient is a simple, reliable solution resulting in low information costs for the network package, as well as for the node itself. It is used for convergent traffic, where sensor nodes send Messages to the sink node. Due to Message Transmission failures inherent to wireless sensor networks, researches in this area agree that point-to-point Message confirmation in these networks is essential. This work proposes solutions for gradient-based routing using a confirmation mechanism for different neighbors, where four protocol variations are evaluated for sensor networks applications in order to monitor and control electrical variables. Results demonstrate that the protocol based on the longest distance has a satisfactory package delivery rate in severe conditions specified to the application. Furthermore, results show in which situations each routing protocol variation better suits the target application.

Moti Yung - One of the best experts on this subject based on the ideXlab platform.

  • indirect discourse proof achieving efficient fair off line e cash
    International Cryptology Conference, 1996
    Co-Authors: Yair Frankel, Yiannis Tsiounis, Moti Yung
    Abstract:

    Cryptography has been instrumental in reducing the involvement of over-head third parties in protocols. For example; a digital signature scheme assures a recipient that a judge who is not present at Message Transmission will nevertheless approve the validity of the signature. Similarly, in off-line electronic cash the bank (which is off-line during a purchase) is assured that if a user double spends he will be traced.

  • perfectly secure Message Transmission
    Journal of the ACM, 1993
    Co-Authors: Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung
    Abstract:

    This paper studies the problem of perfectly secure communication in general network in which processors and communication lines may be faulty. Lower bounds are obtained on the connectivity required for successful secure communication. Efficient algorithms are obtained that operate with this connectivity and rely on no complexity-theoretic assumptions. These are the first algorithms for secure communication in a general network to simultaneously achieve the three goals of perfect secrecy, perfect resiliency, and worst-case time linear in the diameter of the network.