Kannan Srinathan,
Center for Security, Theory and Algorithmic Research,
IIIT-Hyderabad.
In collaboration with Shashank Agrawal and Abhinav Mehta
A B
Faithful messengers but no timing guarantee; may not be able to deliver messages in both directions
Spy S is in a far away land. He wants to send a secret message to R.
Spy R
Not all intermediaries are faithful – who knows what’s on their mind.
Network Model
◦ A directed graph N=(V,E)
◦ Two special nodes S and R in the graph
Timing Model
◦ Completely Asynchronous system
All nodes know
◦ the topology of the network
◦ the protocol specification
Fault Model
◦ An adversary structure
A = {B each B i
1
,B
2
,B
3
,B
4
,…} is a subset of V\{S,R} where
◦ One of the B i
’s can be Byzantine corrupt in an execution
◦ Adversary knows
the topology of the network
the protocol specification
◦ Edges in the network
are secure – messages cannot be read or altered
but messages can be arbitrarily delayed
S wants to send a secret message m chosen from a field to R .
For every corruption B i and every schedule
◦ Reliability: R always terminates with the secret m .
◦ Privacy: Adversary does not know anything about the secret.
Compromising on reliability and/or privacy we can get different flavors of secure message transmission.
Does it matter? YES!
No protocol for SMT if store-and-forward intermediate nodes
SMT protocol exists if routers can compute on their payloads
We use the simple (k,n) threshold scheme
(n≥k) to create n shares of a secret
Knowledge of any set of at most k-1 shares reveals no information about the secret.
Suppose m shares are available (where k≤m≤n )
◦ The secret can be efficiently reconstructed if at least (m+k)/2 shares are correct.
◦ As long as at least (m-k)/2 shares are correct, an incorrect secret will not be reconstructed.
A protocol for an arbitrary sized adversary structure exists iff protocols for all its three sized subsets exist
Going from 3 to size 4
◦ Consider A={B
1
,B
2
,B
3
,B
4
}
◦ Consider 4 subsets of A :
A
1
={B
1
,B
2
,B
3
} , A
2
={B
2
,B
3
,B
4
} , A
3
={B
1
,B
2
,B
4
} , A
4
={B
1
,B
3
,B
4
}
Let P i be the protocol tolerating A i
.
◦ At least 3 A i
’s tolerate the actual corrupt set
◦ S does a (2,4) secret sharing to obtain 4 shares of secret m
◦ The share m i is sent through the protocol P i tolerating A i
◦ R waits till 3 of the 4 protocols terminate with a consistent set of shares, and outputs the reconstructed secret
1
S
P
1
P
2
P
3
P
4 m
1 m
2 m
3
R m
4
Strong path
◦ (the usual path)
Weak path
◦ u
1
, u
2
◦ y
1 blocked nodes head node u
1 y
1 u
2
Adversary structure A={B
1
,B
2
,B
3
}
Theorem
◦ There must exist an honest weak path q
1 every blocked node along the path q
1 avoiding nodes in B
2 and B
3
. such that has a path to R
◦ Similarly, path q
2 and q
3 must exist.
Sub-protocol P
1 using the weak path q
1 k1 k1 k1 k2 m k2 k1+k2
S m+k1
B
1
If B
1 is corrupt, sub-protocols P respectively, terminate securely.
2 and P
3
, which use weak paths q
2 and q
3
R
b1
S b2
R b3
Showing impossibility in this graph suffices.
A passive strategy of b1 coupled with an active strategy of b2 , along with delaying messages from b3 , creates indistinguishability at R .
At most t nodes could be corrupt ( t≤n )
Exponential sized adversary structure containing (n-2) C t subsets
Assume graph is 3t+1 weakly connected and
2t+1 strongly connected
Claim: We can have an efficient protocol for
PSMT between any two nodes.
Assume that a weak path is honest, run a sub-protocol.
Overall, 3t+1 sub-protocols are run out of which 2t+1 terminate securely.
S
Important: Every blocked node now has 2t+1 paths to R k1 k1 k1 k2 m k1+k2 m+k1 k2
R
Minimum connectivity requirements for two variants of (0, ∆)-USMT
◦ Monte Carlo
◦ Las Vegas
Requirements match for Las Vegas (0, ∆)-USMT and (0,0)-USMT (referred so far as PSMT)
Requirements for Monte Carlo (0, ∆)-USMT turn out to be the same as (1, ∆)-USMT – security for free!
How connectivity is affected by
◦ Limited topology knowledge
◦ Compromising security a little bit
This variant has recently been studied (ICITS 2011)
Graph Testing: Given a graph, two special nodes in it and the value of t, can we efficiently find out if it has sufficient connectivity for the existence of a protocol