Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

Abstract

We study the problem of implementing unconditionally secure reliable and private communication (and hence secure computation) in dynamic incomplete networks. Our model assumes that the network is always k-connected, for some k, but the concrete connection graph is adversarially chosen in each round of interaction. We show that, with n players and t malicious corruptions, perfectly secure communication is possible if and only if k>2t. This disproves a conjecture from earlier work, that k>3t is necessary. Our new protocols are much more efficient than previous work; in particular, we improve the round and communication complexity by an exponential factor (in n) in both the semi-honest and the malicious corruption setting, leading to protocols with polynomial complexity.

Original languageEnglish
Title of host publicationTheory of Cryptography - 22nd International Conference, TCC 2024, Proceedings
EditorsElette Boyle, Elette Boyle, Mohammad Mahmoody
Number of pages27
Place of publicationCham
PublisherSpringer
Publication date2025
Pages266–292
ISBN (Print)978-3-031-78022-6
ISBN (Electronic)978-3-031-78023-3
DOIs
Publication statusPublished - 2025
SeriesLecture Notes in Computer Science
Volume15367
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity'. Together they form a unique fingerprint.

Cite this