[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[freehaven-dev] [asmith@theory.lcs.mit.edu: broadcast]
I'm forwarding this to the list so other people can ponder it as well.
David: you're always telling me to point you at papers and you'll hunt them
down. Here you go. :)
Thanks!
--Roger
----- Forwarded message from Adam Smith <asmith@theory.lcs.mit.edu> -----
Date: Mon, 21 Feb 2000 16:47:32 -0500 (EST)
From: Adam Smith <asmith@theory.lcs.mit.edu>
To: Roger Dingledine <arma@theory.lcs.mit.edu>
Subject: broadcast
hey Roger,
Here are two starting points for getting secure broadcasting using digital
signatures. The first is section 6.2.4, p. 115 of Nancy Lynch's book
"Distributed Algorithms". She gives a protocol which guarantees that every
one gets the same message but requires roughly quadratic complexity (more
if you want to tolerate a large number of cheaters in the network).
#2: Apparently, a (slightly) more efficient protocol can be found in a
paper by Dolev and Strong in SIAM Journal of Computing, v.12 n.4 p.656-666
(nov. 1983).
This stuff is almost twenty years old though, so it may be that in the
security literature a better version exists. I haven't done an extensive
search because I really don't know alot about the security journals,
conferences, etc.
cheers,
adam
PS: I'll probably see you tomorrow for the security reading group talk.
There are certainly people there who would know where to look for more
answers to this question.
----- End forwarded message -----