메뉴 건너뛰기




Volumn 13, Issue 1, 2000, Pages 9-30

Secure communication in minimal connectivity models

Author keywords

Multicast; Network security; Privacy; Reliability; Secure multiparty computation

Indexed keywords


EID: 0003640244     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s001459910002     Document Type: Article
Times cited : (93)

References (20)
  • 1
    • 0024861622 scopus 로고
    • On the complexity of radio communication
    • [ABLP]
    • [ABLP] N. Alon, A. Bar-Noy, N. Linial, and D. Peleg, On the complexity of radio communication, ACM STOC, pp. 274-285 (1989).
    • (1989) ACM STOC , pp. 274-285
    • Alon, N.1    Bar-Noy, A.2    Linial, N.3    Peleg, D.4
  • 2
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • [Bea]
    • [Bea] D. Beaver, Multiparty protocols tolerating half faulty processors, Proc. Crypto '89, pp. 560-572 (1989).
    • (1989) Proc. Crypto '89 , pp. 560-572
    • Beaver, D.1
  • 3
    • 0346396336 scopus 로고    scopus 로고
    • Reliable communication over partially authenticated networks
    • [BF]
    • [BF] A. Beimel and M. Franklin, Reliable communication over partially authenticated networks, Theoret. Comput. Sci., 220(1):185-210 (1999).
    • (1999) Theoret. Comput. Sci. , vol.220 , Issue.1 , pp. 185-210
    • Beimel, A.1    Franklin, M.2
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computing
    • [BGW]
    • [BGW] M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computing, Proc. ACM STOC, pp. 1-10 (1988).
    • (1988) Proc. ACM STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • [BBR]
    • [BBR] C. Bennett, G. Brassard, and M. Robert, Privacy amplification by public discussion, SIAM J. Cotnput., 17(2):210-229(1988).
    • (1988) SIAM J. Cotnput. , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.1    Brassard, G.2    Robert, M.3
  • 7
    • 0022144724 scopus 로고
    • Asynchronous consensus and broadcast protocols
    • [BT]
    • [BT] G. Bracha and S. Toueg, Asynchronous consensus and broadcast protocols, J. Assoc. Comput. Mach., 32(4):824-840 (1985).
    • (1985) J. Assoc. Comput. Mach. , vol.32 , Issue.4 , pp. 824-840
    • Bracha, G.1    Toueg, S.2
  • 9
    • 84898947315 scopus 로고
    • Multiparty unconditional secure protocols
    • [CCD]
    • [CCD] D. Chaum, C. Crepeau, and I. Damgard, Multiparty unconditional secure protocols, Proc. ACM STOC, pp. 11-19(1988).
    • (1988) Proc. ACM STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 10
  • 11
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • [Dol]
    • [Dol] D. Dolev, The Byzantine generals strike again, J. Algorithms, 3:14-30 (1982).
    • (1982) J. Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 13
    • 23844506174 scopus 로고    scopus 로고
    • Secure hypergraphs: Privacy from partial broadcast
    • [FY] to appear.
    • [FY] M. Franklin and M. Yung, Secure hypergraphs: privacy from partial broadcast, SIAM J. Discrete Math., to appear.
    • SIAM J. Discrete Math.
    • Franklin, M.1    Yung, M.2
  • 14
    • 0026367257 scopus 로고
    • Fault-tolerant computation in the full information model
    • [GGL]
    • [GGL] O. Goldreich, S. Goldwasser, and N. Linial, Fault-tolerant computation in the full information model, Proc. lEEESymp. FOCS, pp. 447-157 (1991).
    • (1991) Proc. LEEESymp. FOCS , pp. 447-1157
    • Goldreich, O.1    Goldwasser, S.2    Linial, N.3
  • 15
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • [PSL]
    • [PSL] M. Pease, R. Shostak, and L. Lamport, Reaching agreement in the presence of faults, J. Assoc. Comput. Mach., 27(2):228-234 (1980).
    • (1980) J. Assoc. Comput. Mach. , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 16
    • 0024606853 scopus 로고
    • Reliable scheduling in a TMR database system
    • [PG]
    • [PG] F. M. Pittelli and H. Garcia-Molina, Reliable scheduling in a TMR database system, ACM Trans. Comput. Systems, 7(1):25-60 (1989)
    • (1989) ACM Trans. Comput. Systems , vol.7 , Issue.1 , pp. 25-60
    • Pittelli, F.M.1    Garcia-Molina, H.2
  • 17
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • [Rab]
    • [Rab] T. Rabin, Robust sharing of secrets when the dealer is honest or faulty, J. Assoc. Comput. Mach., 41(6):1089-1109 (1994).
    • (1994) J. Assoc. Comput. Mach. , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 18
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • [RB]
    • [RB] T. Rabin and M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority, Proc. ACM STOC, pp. 73-85 (1989).
    • (1989) Proc. ACM STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 19
    • 0012527611 scopus 로고    scopus 로고
    • Efficient perfectly secure message transmission in synchronous networks
    • [SA]
    • [SA] H. Sayeed and H. Abu-Amara, Efficient perfectly secure message transmission in synchronous networks, Inform, and Comput., 126(1):53-61 (1996).
    • (1996) Inform, and Comput. , vol.126 , Issue.1 , pp. 53-61
    • Sayeed, H.1    Abu-Amara, H.2
  • 20
    • 24944432519 scopus 로고    scopus 로고
    • Secure communication in broadcast channels: The answer to Franklin and Wright's question
    • WD
    • [WDJ Y. Wang and Y. Desmedt, Secure communication in broadcast channels: the answer to Franklin and Wright's question, Proc. Eurocrypt '99, pp. 446-458 (1999).
    • (1999) Proc. Eurocrypt '99 , pp. 446-458
    • Wang, Y.1    Desmedt, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.