Our main contributions are: (a) A necessary and sufficient condition for achieving RMT in the partial knowledge model with a general adversary; in order to show sufficiency, we propose RMT-PKA, a protocol that solves RMT whenever this is possible, therefore it is a \emph{unique} protocol (cf.~\cite{PP05}). To the best of our knowledge, this is the first unique protocol for RMT in against general adversaries in the partial knowledge model. (b) A study of efficiency in the case of the \textsl{ad hoc} network model: we show that either the $\calz$-CPA protocol~\cite{PPS14} is fully polynomial or no unique fully polynomial protocol for RMT exists, thus introducing a new notion of uniqueness with respect to efficiency that we call \emph{poly-time uniqueness}.
To obtain our results we introduce, among others, a \emph{joint view} operation on adversary structures, a new notion of separator (RMT-cut), appropriate for RMT in unreliable networks, and a self-reducibility property of the RMT problem, which we show by means of a protocol composition. The latter plays a crucial role in proving the poly-time uniqueness of $\calz$-CPA.
Category / Keywords: foundations / reliable message transmission, byzantine adversary, partial knowledge, general adversary, reliable broadcast, incomplete networks, ad hoc networks, distributed computing, topology knowledge Date: received 14 Mar 2015, last revised 23 Jun 2015 Contact author: sakaval at corelab ntua gr Available format(s): PDF | BibTeX Citation Version: 20150623:092723 (All versions of this report) Short URL: ia.cr/2015/243 Discussion forum: Show discussion | Start new discussion