메뉴 건너뛰기




Volumn 3, Issue 2, 2000, Pages 63-84

Xor-Trees for Efficient Anonymous Multicast and Reception

Author keywords

Algorithms; Anonymous communication; anonymous multicast; Security

Indexed keywords


EID: 0011586610     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/354876.354877     Document Type: Article
Times cited : (51)

References (20)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY
    • Ben-Or, M., Goldwasser, S., and Wigderson, A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 1-10
    • (1988) , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • (Nov.)
    • Blum, M. and Micali, S. 1984. How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13, 4 (Nov.), 850-864
    • (1984) SIAM J. Comput. , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 3
    • 34247222154 scopus 로고
    • Detection of disrupters in the DC protocol
    • (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
    • Bos, J. and Den Boer, B. 1990. Detection of disrupters in the DC protocol. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 320-327
    • (1990) Proceedings of the Workshop on Advances in Cryptology , pp. 320-327
    • Bos, J.1    Den Boer, B.2
  • 4
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC '96, Philadelphia, PA, May 22-24), G. L. Miller, Chair. ACM Press, New York, NY
    • Canetti, R., Feige, U., Goldreich, O., and Naor, M. 1996. Adaptively secure multi-party computation. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC '96, Philadelphia, PA, May 22-24), G. L. Miller, Chair. ACM Press, New York, NY, 639-648
    • (1996) , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 5
    • 0030652586 scopus 로고    scopus 로고
    • Randomness vs. fault-tolerance. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing (PODC '97, Santa Barbara, CA, Aug. 21-24), J. E. Burns and H. Attiya, Chairs. ACM Press, New York, NY
    • Canetti, R., Kushilevitz, E., Ostrovsky, R., and Rosen, A. 1997. Randomness vs. fault-tolerance. In Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing (PODC '97, Santa Barbara, CA, Aug. 21-24), J. E. Burns and H. Attiya, Chairs. ACM Press, New York, NY, 35-44
    • (1997) , pp. 35-44
    • Canetti, R.1    Kushilevitz, E.2    Ostrovsky, R.3    Rosen, A.4
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • (Feb.)
    • Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb.), 84-88
    • (1981) Commun. ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 7
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D. 1988. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptology 1, 1, 65-75
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols
    • In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY
    • Chaum, D. and Damgard, I. 1988. Multiparty unconditionally secure protocols. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88, Chicago, IL, May 2-4), J. Simon, Chair. ACM Press, New York, NY, 11-19
    • (1988) , pp. 11-19
    • Chaum, D.1    Damgard, I.2
  • 10
    • 0023545076 scopus 로고
    • How to play ANY mental game
    • In Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC '87, New York, NY, May 25-27), A. V. Aho, Ed. ACM Press, New York, NY
    • Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play ANY mental game. In Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC '87, New York, NY, May 25-27), A. V. Aho, Ed. ACM Press, New York, NY, 218-229
    • (1987) , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0345253860 scopus 로고    scopus 로고
    • Construction of a pseudorandom generator from any one-way function
    • Hastad, J., Impagliazzo, R., Levin, L. A., and Luby, M. 1999. Construction of a pseudorandom generator from any one-way function. SIAM J. Comput. 28, 4, 1364-1396
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Hastad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 12
    • 0003657590 scopus 로고    scopus 로고
    • The Art of Computer Programming
    • 3rd ed. Addison-Wesley, Reading, MA
    • Knuth, D. E. 1997. The Art of Computer Programming. 3rd ed. Addison-Wesley, Reading, MA
    • (1997)
    • Knuth, D.E.1
  • 14
    • 0011583205 scopus 로고
    • How to implement ISDNs without user observability: some remarks
    • Tech Rep. TR 14/85. University of Karlsruhe, Germany
    • Pfitzmann, A. 1985. How to implement ISDNs without user observability: some remarks. Tech Rep. TR 14/85. University of Karlsruhe, Germany
    • (1985)
    • Pfitzmann, A.1
  • 15
    • 0023331864 scopus 로고
    • Networks without user observability
    • (Apr.)
    • Pfitzmann, A. and Waidner, M. 1987. Networks without user observability. Comput. Secur. 6, 2 (Apr.), 158-166
    • (1987) Comput. Secur. , vol.6 , pp. 158-166
    • Pfitzmann, A.1    Waidner, M.2
  • 16
    • 0011702966 scopus 로고
    • ISDN-mixes: Untraceable communication with very small bandwidth overhead
    • In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (Feb., Mannheim, Germany)
    • Pfitzmann, A., Pfitzmann, B., and Waidner, M. 1991. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In Proceedings of the GI/ITG Conference on Communication in Distributed Systems (Feb., Mannheim, Germany). 451-463
    • (1991) , pp. 451-463
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 17
    • 0027224328 scopus 로고
    • Cryptographic defense against traffic analysis
    • In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC '93, San Diego, CA, May 16-18), R. Kosaraju, D. Johnson, and A. Aggarwal, Chairs. ACM Press, New York, NY
    • Rackoff, C. and Simon, D. R. 1993. Cryptographic defense against traffic analysis. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing (STOC '93, San Diego, CA, May 16-18), R. Kosaraju, D. Johnson, and A. Aggarwal, Chairs. ACM Press, New York, NY, 672-681
    • (1993) , pp. 672-681
    • Rackoff, C.1    Simon, D.R.2
  • 18
    • 0030676973 scopus 로고    scopus 로고
    • Anonymous connections and onion routing
    • In Proceedings of the 1997 IEEE Computer Society Symposium on Reasearch in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • Syverson, P. F., Goldschlag, D. M., and Reed, M. G. 1997. Anonymous connections and onion routing. In Proceedings of the 1997 IEEE Computer Society Symposium on Reasearch in Security and Privacy (Oakland, CA, May). IEEE Computer Society Press, Los Alamitos, CA
    • (1997)
    • Syverson, P.F.1    Goldschlag, D.M.2    Reed, M.G.3
  • 19
    • 84896508047 scopus 로고
    • Unconditional sender and recipient untraceability in spite of active attacks
    • In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
    • Waidner, M. 1990. Unconditional sender and recipient untraceability in spite of active attacks. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 302-319
    • (1990) , pp. 302-319
    • Waidner, M.1
  • 20
    • 85032863028 scopus 로고
    • The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability
    • In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY
    • Waidner, M. and Pfitzmann, B. 1990. The dining cryptographers in the disco: Unconditional sender and recipient untraceability with computationally secure serviceability. In Proceedings of the Workshop on Advances in Cryptology (EUROCRYPT '89, Houthalen, Belgium, Apr. 10-13), J.-J. Quisquater and J. Vandewalle, Eds. Springer Lecture Notes in Computer Science. Springer-Verlag, New York, NY, 690
    • (1990) , pp. 690
    • Waidner, M.1    Pfitzmann, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.