Applied Cryptography and Network Security

Volume 6715 of the series Lecture Notes in Computer Science pp 292-308

Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary

  • Ashish ChoudhuryAffiliated withApplied Statistics Unit, Indian Statistical Institute
  • , Kaoru KurosawaAffiliated withDepartment of Computer and Information Sciences, Ibaraki University
  • , Arpita PatraAffiliated withDepartment of Computer Science, Aarhus University

* Final gross prices may vary according to local VAT.

Get Access


Patra et al. (IJACT ’09) gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold \({\cal Q}^2\) adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. They have left it as an open problem to design efficient protocol for almost perfectly secure message transmission, tolerating \({\cal Q}^2\) adversary structure.

In this paper, we show the first single round almost perfectly secure message transmission protocol tolerating \({\cal Q}^2\) adversary structure. The computation and communication complexities of the protocol are both polynomial in the size of underlying linear secret sharing scheme (LSSS). This solves the open problem posed by Patra et al.

When we restrict our general protocol to a threshold adversary, we obtain a single round, communication optimal almost secure message transmission protocol tolerating threshold adversary, which is much more computationally efficient and relatively simpler than the previous single round, communication optimal protocol of Srinathan et al. (PODC ’08).


Information theoretic security non-threshold adversary Byzantine corruption Efficiency