A Novel approach to Adaptively Secure Message Transmission in The Non-Erasure Model

Main Article Content

Maged Hamada Ibrahim

Abstract

Secure message transmission can be solved perfectly assuming that the adversary controls less than one half of the paths connecting two nodes in a network while the rest of the paths are physically secured. Nevertheless, in many settings such assumption can be too strong to be realistic. While it may be reasonable to restrict the adversary full corruption, the adversary may have eavesdropping capabilities that extend over the whole network (beyond the corrupted nodes). In this case, we cannot run away of employing encryption techniques and hence, in addition to the fact that the security turns to be computational, adaptive adversaries come to play. In this paper, we present a new Adaptively Secure Message Transmission (ASMT) that is based on any trapdoor function in the non-erasure model to allow any pair of nodes in a network to communicate in an adaptively secure manner assuming that the adversary observes (eavesdrops) the communications on all paths but actively corrupts a fraction of these paths. Our constructions are built using any available trapdoor function that is one-way secure.

 

Keywords: Adaptive adversary, perfectly secure transmission, Simulation based security, Non-committing encryption, Non-erasure model.

Downloads

Download data is not yet available.

Article Details

Section
Articles