Asymptotically Optimal Two-Round Perfectly Secure Message Transmission

  • Saurabh Agarwal
  • Ronald Cramer
  • Robbert de Haan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4117)


The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (\({\mathcal{S}}\)) and receiver (\({\mathcal{R}}\)) that are connected by a synchronous network of n≥2t+1 noiseless 2-way communication channels. Their goal is to communicate privately and reliably, despite the presence of an adversary that may actively corrupt at most t of those channels. These properties should hold information theoretically and without error.

We propose an asymptotically optimal solution for this problem. The proposed protocol consists of two communication rounds, and a total of O(ℓn) bits are exchanged in order to transmit a message of ℓ bits. Earlier, at CRYPTO 2004, an equally optimal solution has been claimed. However, we give a counter-example showing that their result is not perfectly reliable. The flaw seems to be fundamental and non-trivial to repair. Our approach is overall entirely different, yet it also makes essential use of their neat communication efficient technique for reliably transmitting conflict graphs.

What distinguishes our approach from previous ones is a technique that allows to identify all actively corrupted channels, initially trading it off against privacy. A perfectly secure and reliable secret key is then distilled by privacy amplification.


Reliable and private transmission information theoretic security zero-error protocols communication efficiency 


  1. 1.
    Desmedt, Y.G., Wang, Y.: Perfectly Secure Message Transmission Revisited. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 502–517. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Dolev, D., Dwork, C., Waarts, O., Yung, M.: Perfectly Secure Message Transmission. JACM 40(1), 17–47 (1993)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Sayeed, H., Abu-Amara, H.: Efficient Perfectly Secure Message Transmission in Synchronous Networks. Information and Computation 126(1), 53–61 (1996)MATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Shamir, A.: How to Share a Secret. Communications of the ACM 22, 612–613 (1979)MATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Srinathan, S., Narayanan, A., Pandu Rangan, C.: Optimal Perfectly Secure Message Transmission. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 545–561. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Saurabh Agarwal
    • 1
  • Ronald Cramer
    • 2
    • 3
  • Robbert de Haan
    • 3
  1. 1.Basic Research in Computer Science, funded by Danish National Research Foundation 
  2. 2.Mathematical InstituteLeiden UniversityThe Netherlands
  3. 3.CWIAmsterdamThe Netherlands

Personalised recommendations