[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[freehaven-dev] [asmith@theory.lcs.mit.edu: broadcast]



I'm forwarding this to the list so other people can ponder it as well.
David: you're always telling me to point you at papers and you'll hunt them
down. Here you go. :)

Thanks!
--Roger

----- Forwarded message from Adam Smith <asmith@theory.lcs.mit.edu> -----

Date: Mon, 21 Feb 2000 16:47:32 -0500 (EST)
From: Adam Smith <asmith@theory.lcs.mit.edu>
To: Roger Dingledine <arma@theory.lcs.mit.edu>
Subject: broadcast


hey Roger,

Here are two starting points for getting secure broadcasting using digital
signatures. The first is section 6.2.4, p. 115 of Nancy Lynch's book
"Distributed Algorithms". She gives a protocol which guarantees that every
one gets the same message but requires roughly quadratic complexity (more
if you want to tolerate a large number of cheaters in the network).

#2: Apparently, a (slightly) more efficient protocol can be found in a
paper by Dolev and Strong in SIAM Journal of Computing, v.12 n.4 p.656-666
(nov.  1983). 

This stuff is almost twenty years old though, so it may be that in the
security literature a better version exists. I haven't done an extensive
search because I really don't know alot about the security journals,
conferences, etc.

cheers,
adam

PS: I'll probably see you tomorrow for the security reading group talk.
There are certainly people there who would know where to look for more
answers to this question.


----- End forwarded message -----