메뉴 건너뛰기




Volumn , Issue , 2002, Pages 193-202

On perfectly secure communication over arbitrary networks

Author keywords

Adversary structures; Information theoretic security; Secure communication; Secure multiparty computation

Indexed keywords

COMPUTATIONAL COMPLEXITY; INFORMATION THEORY; INTERCONNECTION NETWORKS; MAXIMUM PRINCIPLE; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0036957420     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (61)

References (19)
  • 2
    • 0003745894 scopus 로고    scopus 로고
    • Secure schemes for secret sharing and key distribution
    • PhD thesis, Department of Computer Science, Technion
    • A. Beimel. Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Department of Computer Science, Technion, 1996.
    • (1996)
    • Beimel, A.1
  • 8
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. JACM, pages 17-47, 1993.
    • (1993) JACM , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 11
    • 0031623892 scopus 로고    scopus 로고
    • A characterization of span program size and improved lower bonds for monotone span programs
    • A. Gal. A characterization of span program size and improved lower bonds for monotone span programs. In Proceedings of 30th ACM Symposium on Theory of Computing (STOC), pages 429-437, 1998.
    • (1998) Proceedings of 30th ACM Symposium on Theory of Computing (STOC) , pp. 429-437
    • Gal, A.1
  • 14
    • 33745999816 scopus 로고    scopus 로고
    • Player simulation and general adversary structures in perfect multiparty computation
    • April
    • M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, April 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 31-60
    • Hirt, M.1    Maurer, U.2
  • 15
    • 0023543848 scopus 로고
    • Secret sharing scheme realizing general access structure
    • IEEE
    • M. Ito, A. Saito, and T. Nishizeki. Secret sharing scheme realizing general access structure. In Proceedings of IEEE Globecom 87, pages 99-102. IEEE, 1987.
    • (1987) Proceedings of IEEE Globecom 87 , pp. 99-102
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 18
    • 0012527611 scopus 로고    scopus 로고
    • Efficient perfectly secure message transmission in synchronous networks
    • H. Sayeed and H. Abu-Amara. Efficient perfectly secure message transmission in synchronous networks. Information and Computation, 126(1):53-61, 1996.
    • (1996) Information and Computation , vol.126 , Issue.1 , pp. 53-61
    • Sayeed, H.1    Abu-Amara, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.