Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Patra et al. (IJACT ’09) gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold \({\cal Q}^2\) adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. They have left it as an open problem to design efficient protocol for almost perfectly secure message transmission, tolerating \({\cal Q}^2\) adversary structure.

In this paper, we show the first single round almost perfectly secure message transmission protocol tolerating \({\cal Q}^2\) adversary structure. The computation and communication complexities of the protocol are both polynomial in the size of underlying linear secret sharing scheme (LSSS). This solves the open problem posed by Patra et al.

When we restrict our general protocol to a threshold adversary, we obtain a single round, communication optimal almost secure message transmission protocol tolerating threshold adversary, which is much more computationally efficient and relatively simpler than the previous single round, communication optimal protocol of Srinathan et al. (PODC ’08).