메뉴 건너뛰기




Volumn 53, Issue 6, 2006, Pages 881-917

On the composition of authenticated Byzantine Agreement

Author keywords

Authenticated Byzantine Agreement; Lower bounds; Protocol composition; Randomized protocols

Indexed keywords

AUTHENTICATED BYZANTINE AGREEMENT; PROTOCOL COMPOSITION; RANDOMIZED PROTOCOLS;

EID: 33847139020     PISSN: 00045411     EISSN: 1557735X     Source Type: Journal    
DOI: 10.1145/1217856.1217857     Document Type: Article
Times cited : (20)

References (32)
  • 1
    • 0035166072 scopus 로고    scopus 로고
    • How to go beyond the black-box simulation barrier
    • IEEE Computer Society Press, Los Alamitos, CA. pp
    • BARAK, B. 2001. How to go beyond the black-box simulation barrier. In Proceedings of the 42nd Annual Symposium on Fundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA. pp. 106-115.
    • (2001) Proceedings of the 42nd Annual Symposium on Fundations of Computer Science , pp. 106-115
    • BARAK, B.1
  • 2
    • 33847174495 scopus 로고    scopus 로고
    • A note on secure protocol initialization and setup in concurrent settings. Cryptology ePrint Archive
    • Report 2004/006
    • BARAK, B., LINDELL, Y., AND RABIN, T. 2004. A note on secure protocol initialization and setup in concurrent settings. Cryptology ePrint Archive, Report 2004/006.
    • (2004)
    • BARAK, B.1    LINDELL, Y.2    RABIN, T.3
  • 3
    • 33746365751 scopus 로고
    • Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority
    • BEAVER, D. 1991. Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty minority. J. Crypt. 4, 2, 75-122.
    • (1991) J. Crypt , vol.4 , Issue.2 , pp. 75-122
    • BEAVER, D.1
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • CANETTI, R. 2000. Security and composition of multiparty cryptographic protocols. J. Crypt. 13, 1, 143-202.
    • (2000) J. Crypt , vol.13 , Issue.1 , pp. 143-202
    • CANETTI, R.1
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press, Los Alamitos, CA. pp
    • CANETTI, R. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd Annual Symposium on Fundations of Computer Science. IEEE Computer Society Press, Los Alamitos, CA. pp. 136-145.
    • (2001) Proceedings of the 42nd Annual Symposium on Fundations of Computer Science , pp. 136-145
    • CANETTI, R.1
  • 8
    • 35248819315 scopus 로고    scopus 로고
    • Universal composition with joint state
    • Proceedings of CRYPTO 2003, Springer Verlag, New York, pp
    • CANETTI, R. AND RABIN, T. 2003. Universal composition with joint state. In Proceedings of CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729. Springer Verlag, New York, pp. 265-281.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 265-281
    • CANETTI, R.1    RABIN, T.2
  • 11
    • 84974597111 scopus 로고    scopus 로고
    • Parallel reducibility for information-theoretically secure computation
    • Proceedings of CRYPTO'00, Springer-Verlag, New York, pp
    • DODIS, Y., AND MICALI, S. 2000. Parallel reducibility for information-theoretically secure computation. In Proceedings of CRYPTO'00. Lecture Notes in Computer Science, vol. 1880. Springer-Verlag, New York, pp. 74-92.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 74-92
    • DODIS, Y.1    MICALI, S.2
  • 13
    • 0001683636 scopus 로고
    • Authenticated algorithms for byzantine agreement
    • DOLEV, D., AND STRONG, H. R. 1983. Authenticated algorithms for byzantine agreement. SIAM J. Comput. 12, 4, 656-665.
    • (1983) SIAM J. Comput , vol.12 , Issue.4 , pp. 656-665
    • DOLEV, D.1    STRONG, H.R.2
  • 14
    • 0022562351 scopus 로고
    • Easy impossibility proofs for distributed consensus problems
    • FISCHER, M., LYNCH, N., AND MERRITT, M. 1986. Easy impossibility proofs for distributed consensus problems. Distrib. Comput. 1, 1, 26-39.
    • (1986) Distrib. Comput , vol.1 , Issue.1 , pp. 26-39
    • FISCHER, M.1    LYNCH, N.2    MERRITT, M.3
  • 15
    • 84947209216 scopus 로고    scopus 로고
    • Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch
    • Proceedings of EUROCRYPT 2002, Springer-Verlag, New York, pp
    • FITZI, M., GISIN, N., MAURER, U., AND VON ROTZ, O. 2002a. Unconditional Byzantine agreement and multi-party computation secure against dishonest minorities from scratch. In Proceedings of EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332. Springer-Verlag, New York, pp. 482-501.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 482-501
    • FITZI, M.1    GISIN, N.2    MAURER, U.3    VON ROTZ, O.4
  • 20
    • 0141610193 scopus 로고    scopus 로고
    • Cryptography and cryptographic protocols
    • GOLDREICH, O. 2003. Cryptography and cryptographic protocols. In Dist. Comput. 16, 2, 177-199.
    • (2003) Dist. Comput , vol.16 , Issue.2 , pp. 177-199
    • GOLDREICH, O.1
  • 22
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • GOLDREICH, O., AND KRAWCZYK, H. 1996. On the composition of zero-knowledge proof systems. SIAM J. Comput. 25, 1, 169-192.
    • (1996) SIAM J. Comput , vol.25 , Issue.1 , pp. 169-192
    • GOLDREICH, O.1    KRAWCZYK, H.2
  • 24
    • 22344432877 scopus 로고    scopus 로고
    • Secure computation without agreement
    • GOLDWASSER, S., AND LINDELL, Y. 2005. Secure computation without agreement. J. Crypt. 18, 3, 247-287.
    • (2005) J. Crypt , vol.18 , Issue.3 , pp. 247-287
    • GOLDWASSER, S.1    LINDELL, Y.2
  • 25
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • GOLDWASSER, S., MICALI, S., AND RIVEST, R. L. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281-308.
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • GOLDWASSER, S.1    MICALI, S.2    RIVEST, R.L.3
  • 26
    • 0002257571 scopus 로고
    • Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults
    • GONG, L., LINCOLN, P., AND RUSHBY, J. 1995. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Dependable Computing for Critical Applications, pp. 139-157.
    • (1995) Dependable Computing for Critical Applications , pp. 139-157
    • GONG, L.1    LINCOLN, P.2    RUSHBY, J.3
  • 28
    • 84974655726 scopus 로고    scopus 로고
    • MICALI, S., AND ROGAWAY, P. 1991. Secure computation. Unpublished manuscript, 1992. Preliminary version in Proceedings of CRYPTO'91. Lecture Notes in Computer Science, 576. Springer-Verlag, New York, pp. 392-404.
    • MICALI, S., AND ROGAWAY, P. 1991. Secure computation. Unpublished manuscript, 1992. (Preliminary version in Proceedings of CRYPTO'91. Lecture Notes in Computer Science, vol. 576. Springer-Verlag, New York, pp. 392-404.
  • 29
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • PEASE, M., SHOSTAK, R., AND LAMPORT, L. 1980. Reaching agreement in the presence of faults. J. ACM 27, 2, 228-234.
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • PEASE, M.1    SHOSTAK, R.2    LAMPORT, L.3
  • 30
    • 0003445668 scopus 로고    scopus 로고
    • Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n/3
    • 2882, 90830, IBM Research
    • PFITZMANN, B., AND WAIDNER, M. 1996. Information-theoretic pseudosignatures and Byzantine agreement for t ≥ n/3. Tech. Rep. RZ 2882 (#90830). IBM Research.
    • (1996) Tech. Rep. RZ
    • PFITZMANN, B.1    WAIDNER, M.2
  • 31
    • 84957621865 scopus 로고    scopus 로고
    • On the concurrent composition of zero-knowledge proofs
    • Proceedings of EUROCRYPT'99, Springer-Verlag, New York, pp
    • RICHARDSON, R., AND KILIAN, J. 1999. On the concurrent composition of zero-knowledge proofs. In Proceedings of EUROCRYPT'99. Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, New York, pp. 415-431.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 415-431
    • RICHARDSON, R.1    KILIAN, J.2
  • 32
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2, 120-126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • RIVEST, R.L.1    SHAMIR, A.2    ADLEMAN, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.