Secure message transmission on directed networks J´erˆome Renault∗, Ludovic Renou† & Tristan Tomala‡ December 7, 2010

Extended abstract Consider a sender S and a receiver R as two distant nodes in an directed graph ~ The sender has some private information (a secret), unknown to the receiver and G. all other nodes in the graph. There is a collection A of potential adversaries; each A ∈ A is a set of nodes in the graph (excluding S and R). For instance, A might be the collection of all set of nodes with at most k elements. Secret communication between the sender and the receiver is possible if there exists a protocol (profile of behavioral strategies) such that the following two requirements hold: if all nodes abide by the protocol, 1) the receiver correctly learns the secret of the sender and 2) no adversary A ∈ A gets additional information about the secret. Strongly secure communication between the sender and the receiver is possible if there exists a protocol such that the following requirements hold: 1) secret communication between the sender and the receiver is possible, 2) for any adversary A ∈ A, for any deviation of the adversary A, the receiver correctly learns the secret with arbitrary high probability and no adversary, including A, gets additional information about the secret. ∗

GREMAQ-TSE, Manufacture des Tabacs, Universit Toulouse 1, 31000 Toulouse, France.

jerome.renault @tse-fr.eu † Department of Economics, University of Leicester, Leicester LE1 7RH, United Kingdom. [email protected] ‡ Department of Economics and Finance, HEC School of Management, 78351 Jouy-en-Josas Cedex, France. [email protected]

1

~ We show that secret communication is possible if and only if the the graph G is weakly A-connected, i.e., for each adversary A ∈ A, there exists a (directed or undirected) path from S to R that does not intersect A. Additionally, we show that strongly secure communication is possible if and only if ~ \ A has a strongly 1-connected subgraph that is A-connected, for each A ∈ A, the G i.e., for each A0 ∈ A, there exists a (directed or undirected) path from S to R that ~ \ A. does not intersect A0 \ A in G We relate these results to the problem of (partial) implementation of social choice functions on networks.

2

Secure message transmission on directed networks

Dec 7, 2010 - Consider a sender S and a receiver R as two distant nodes in an directed graph. G. The sender has some private information (a secret), ...

49KB Sizes 3 Downloads 172 Views

Recommend Documents

On Optimal Secure Message Transmission by Public ...
and Technology, University of Electronic Science and Technology of China ... iCORE Information Security Lab at the University of Calgary. that R fails to recover ...

Opinion dynamics on directed small-world networks - Springer Link
Received 18 January 2008 / Received in final form 22 July 2008. Published online 10 September 2008 – cO EDP Sciences, Societ`a Italiana di Fisica, ...

Kinetic models for wealth exchange on directed networks
Feb 14, 2009 - Kinetic models for wealth exchange on directed networks .... at the site i. ∑ ..... applications in other spheres of social science, as in ap-.

Opinion dynamics on directed small-world networks - Springer Link
Sep 10, 2008 - Department of Physics, University of Fribourg, Chemin du Muse 3, 1700 Fribourg, Switzerland. Received 18 January 2008 / Received in final ...

Software-Directed Power-Aware Interconnection Networks - CiteSeerX
takes in the statically compiled message flow of an application and analyzes the traffic levels ... Concurrently, a hardware online mecha- ..... send(X[i]) node7 i++.

Software-Directed Power-Aware Interconnection Networks - CiteSeerX
utilization statistics over fixed sampling windows, that are later compared to ..... R ate. (b) Step 1: Injection rate functions for the two messages. 1000. 1000. 300. 600 ...... Architectural Support for Programming Language and Operating. Systems .

high speed and secure data transmission using ...
in the amount of digital data transmitted via the Internet, representing text .... each word with an approximate signature pattern for the word opposed to an actual.

Patterns of Link Reciprocity in Directed Networks
Dec 20, 2004 - their actual degree of correlation between mutual links. We find that real ... computer cables) and of a purely unidirectional one (such as citation ...

Disease spread in smallsize directed trade networks
applications range from social interactions of primates, mana- kins and scientists .... algorithm, starting with a seed network and based on five parameters.

Optimal synchronization of directed complex networks
Jun 23, 2016 - L is the Laplacian matrix defined for directed networks with entries defined ... values ri populate the diagonal matrix R ј diagрr1,…,rNЮ.

Disease spread in smallsize directed trade networks
Disease spread in small-size directed trade networks: the role of hierarchical .... monly sold for planting in private gardens and public spaces. (e.g. Camellia ...

Finding Hierarchy in Directed Online Social Networks - CS Rutgers
have been revisited in light of the large data now available about people and ..... Compare how hierarchy emerges in online social graphs of different types of ...

Secure Multiparty Computations on Bitcoin
Firstly, we show that the Bitcoin system provides an attractive way to .... This situation is clearly unsatisfactory from the security point of view, ..... All of the popular sites charge a fee for their service, called the house edge (on top of the

Speed and Secure Mobile Financial Services - F5 Networks
Use of mobile devices for financial services is exploding across the banking, trading, and insurance markets. ... What is the tag for this one? F5 Networks, Inc.

MESSAGE
your labor from long years of acquiring basic knowledge and skills from your dear Alma Mater. Let me be with you' giving ... ardor and diligence. Don't be scared.

Secure Anonymous routing in Ad Hoc networks
vulnerable to packet type analysis attacks thus do not provide complete ... requiring operations, this goal effectively means that the protocol should make ...

Designing A Secure Reliable File System for Sensor Networks
1. INTRODUCTION. A wireless sensor network is composed of sensor nodes that have ...... Sense-and-Respond Systems, Applications and Services. (2005) ...

pdf-1471\juniper-networks-secure-access-ssl-vpn-configuration ...
pdf-1471\juniper-networks-secure-access-ssl-vpn-configuration-guide.pdf. pdf-1471\juniper-networks-secure-access-ssl-vpn-configuration-guide.pdf. Open.

Transmission Power Control in Wireless Ad Hoc Networks
Transmission Power Control in Wireless Ad Hoc. Networks: ..... performance (compared to TDMA and FDMA), CDMA has been chosen as the access technology of choice in cellular systems, including the recently adopted 3G systems.

Unit 4 Transmission Lines and Networks esrmnotes.in.pdf ...
Page 4 of 162. Unit 4 Transmission Lines and Networks esrmnotes.in.pdf. Unit 4 Transmission Lines and Networks esrmnotes.in.pdf. Open. Extract. Open with.