메뉴 건너뛰기




Volumn , Issue , 2001, Pages 580-589

The round complexity of verifiable secret sharing and secure multicast

Author keywords

[No Author keywords available]

Indexed keywords

BOUNDARY CONDITIONS; COMPUTATIONAL METHODS; INFORMATION THEORY; MULTICASTING; NETWORK PROTOCOLS; SECURITY OF DATA; SET THEORY; STATISTICAL METHODS;

EID: 0034830283     PISSN: 07349025     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/380752.380853     Document Type: Conference Paper
Times cited : (105)

References (44)
  • 2
    • 85032862464 scopus 로고    scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • LNCS
    • Crypto '89 , vol.435 , pp. 560-572
    • Beaver, D.1
  • 23
    • 84936167251 scopus 로고
    • Strong verifiable secret sharing
    • (1990) WDAG90 , pp. 213-227
    • Dwork, C.1
  • 39
    • 84982943258 scopus 로고    scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • LNCS
    • Crypto '91 , vol.576 , pp. 129-140
    • Pedersen, T.1
  • 40
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • (1994) JACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.