메뉴 건너뛰기




Volumn , Issue , 2005, Pages 191-201

Asynchronous verifiable information dispersal

Author keywords

[No Author keywords available]

Indexed keywords

ASYMPTOTIC STABILITY; CLIENT SERVER COMPUTER SYSTEMS; COMPUTATIONAL COMPLEXITY; DATA TRANSFER; DISTRIBUTED COMPUTER SYSTEMS; FAULT TOLERANT COMPUTER SYSTEMS; INFORMATION SERVICES; STORAGE ALLOCATION (COMPUTER);

EID: 33749418149     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELDIS.2005.9     Document Type: Conference Paper
Times cited : (123)

References (20)
  • 1
    • 37049009792 scopus 로고    scopus 로고
    • Scalable secure storage when half the system is faulty
    • Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP), Springer
    • N. Alon, H. Kaplan, M. Krivelevich, D. Malkhi, and J. P. Stern, "Scalable secure storage when half the system is faulty," in Proc. 27th International Colloquium on Automata, Languages and Programming (ICALP), vol. 1853 of Lecture Notes in Computer Science, pp. 576-587, Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 576-587
    • Alon, N.1    Kaplan, H.2    Krivelevich, M.3    Malkhi, D.4    Stern, J.P.5
  • 6
    • 84880899710 scopus 로고    scopus 로고
    • Secure and efficient asynchronous broadcast protocols
    • Advances in Cryptology: CRYPTO 2001 Springer
    • C. Cachin, K. Kursawe, F. Petzold, and V. Shoup, "Secure and efficient asynchronous broadcast protocols (extended abstract)," in Advances in Cryptology: CRYPTO 2001. vol. 2139 of Lecture Notes in Computer Science, pp. 524-541, Springer, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 524-541
    • Cachin, C.1    Kursawe, K.2    Petzold, F.3    Shoup, V.4
  • 7
    • 84867149301 scopus 로고    scopus 로고
    • Asynchronous verifiable information dispersal
    • IBM Research, Dec.
    • C. Cachin and S. Tessaro, "Asynchronous verifiable information dispersal," Research Report RZ 3569, IBM Research, Dec. 2004.
    • (2004) Research Report , vol.RZ 3569
    • Cachin, C.1    Tessaro, S.2
  • 8
    • 33646419451 scopus 로고    scopus 로고
    • Optimal resilience for erasurecoded Byzantine distributed storage
    • IBM Research, Feb.
    • C. Cachin and S. Tessaro, "Optimal resilience for erasurecoded Byzantine distributed storage," Research Report RZ 3575, IBM Research, Feb. 2005.
    • (2005) Research Report , vol.RZ 3575
    • Cachin, C.1    Tessaro, S.2
  • 14
    • 85028775022 scopus 로고
    • Secret sharing made short
    • Advances in Cryptology: CRYPTO '93, Springer
    • H. Krawczyk, "Secret sharing made short," in Advances in Cryptology: CRYPTO '93, vol. 773 of Lecture Notes in Computer Science, pp. 136-146, Springer, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 136-146
    • Krawczyk, H.1
  • 16
    • 0033719035 scopus 로고    scopus 로고
    • An architecture for survivable coordination in large distributed systems
    • D. Malkhi and M. K. Reiter, "An architecture for survivable coordination in large distributed systems," IEEE Transactions on Knowledge and Data Engineering, vol. 12, no. 2, pp. 187-202, 2000.
    • (2000) IEEE Transactions on Knowledge and Data Engineering , vol.12 , Issue.2 , pp. 187-202
    • Malkhi, D.1    Reiter, M.K.2
  • 18
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • Advances in Cryptology: CRYPTO' 91, Springer
    • T. P. Pedersen, "Non-interactive and information-theoretic secure verifiable secret sharing," in Advances in Cryptology: CRYPTO' 91, vol. 576 of Lecture Notes in Computer Science, pp. 129-140, Springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 19
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM, vol. 36, no. 2, pp. 335-348, 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 20
    • 1842599265 scopus 로고    scopus 로고
    • Securing threshold cryptosystems against chosen ciphertext attack
    • V. Shoup and R. Gennaro, "Securing threshold cryptosystems against chosen ciphertext attack," Journal of Cryptology, vol. 15, no. 2, pp. 75-96, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 75-96
    • Shoup, V.1    Gennaro, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.