-
1
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," in Advances in Cryptology - CRYPTO'91, 1991, pp. 129-140.
-
(1991)
Advances in Cryptology - CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
2
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
84957653598
-
Distributed Pseudo-random Functions and KDCs
-
M. Naor, B. Pinkas, and O. Reingold, "Distributed Pseudo-random Functions and KDCs," in Advances in Cryptology - EUROCRYPT'99, 1999, pp. 327-346.
-
(1999)
Advances in Cryptology - EUROCRYPT'99
, pp. 327-346
-
-
Naor, M.1
Pinkas, B.2
Reingold, O.3
-
7
-
-
0034500567
-
Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography
-
C. Cachin, K. Kursawe, and V. Shoup, "Random Oracles in Constantipole: Practical Asynchronous Byzantine Agreement Using Cryptography," in PODC'00, 2000, pp. 123-132.
-
(2000)
PODC'00
, pp. 123-132
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
8
-
-
84937429269
-
A Threshold Pseudorandom Function Construction and Its Applications
-
J. B. Nielsen, "A Threshold Pseudorandom Function Construction and Its Applications," in Advances in Cryptology - CRYPTO'02, 2002, pp. 401-416.
-
(2002)
Advances in Cryptology - CRYPTO'02
, pp. 401-416
-
-
Nielsen, J.B.1
-
9
-
-
33846862213
-
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
-
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems," Journal of Cryptology, vol. 20, no. 1, pp. 51-83, 2007.
-
(2007)
Journal of Cryptology
, vol.20
, Issue.1
, pp. 51-83
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
10
-
-
0022199386
-
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch, "Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults," in FOCS'85, 1985, pp. 383-395.
-
(1985)
FOCS'85
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
11
-
-
0023538330
-
A Practical Scheme for Non-interactive Verifiable Secret Sharing
-
P. Feldman, "A Practical Scheme for Non-interactive Verifiable Secret Sharing," in FOCS'87, 1987, pp. 427-437.
-
(1987)
FOCS'87
, pp. 427-437
-
-
Feldman, P.1
-
12
-
-
85027164480
-
How to Withstand Mobile Virus Attacks (Ext. Abstract)
-
R. Ostrovsky and M. Yung, "How to Withstand Mobile Virus Attacks (Ext. Abstract)," in PODC'91, 1991, pp. 51-59.
-
(1991)
PODC'91
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
13
-
-
84957626176
-
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," in Advances in Cryptology - CRYPTO'95, 1995, pp. 339-352.
-
(1995)
Advances in Cryptology - CRYPTO'95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
14
-
-
0027313816
-
Fast asynchronous byzantine agreement with optimal resilience
-
R. Canetti and T. Rabin, "Fast asynchronous byzantine agreement with optimal resilience," in STOC'93, 1993, pp. 42-51.
-
(1993)
STOC'93
, pp. 42-51
-
-
Canetti, R.1
Rabin, T.2
-
15
-
-
57549095453
-
An Almost-surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience
-
I. Abraham, D. Dolev, and J. Y. Halpern, "An Almost-surely Terminating Polynomial Protocol for Asynchronous Byzantine Agreement with Optimal Resilience," in PODC'08, 2008, pp. 405-414.
-
(2008)
PODC'08
, pp. 405-414
-
-
Abraham, I.1
Dolev, D.2
Halpern, J.Y.3
-
16
-
-
70350247288
-
Efficient Asynchronous Verifiable Secret Sharing and Byzantine Agreement with Optimal Resilience
-
A. Patra, A. Choudhary, and C. P. Rangan, "Efficient Asynchronous Verifiable Secret Sharing and Byzantine Agreement with Optimal Resilience," Cryptology ePrint: 2008/424, 2008.
-
(2008)
Cryptology ePrint
, vol.424
, pp. 2008
-
-
Patra, A.1
Choudhary, A.2
Rangan, C.P.3
-
17
-
-
0038687710
-
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
-
C. Cachin, K. Kursawe, A.Lysyanskaya, and R. Strobl, "Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems," in CCS'02, 2002, pp. 88-97.
-
(2002)
CCS'02
, pp. 88-97
-
-
Cachin, C.1
Kursawe, K.2
Lysyanskaya, A.3
Strobl, R.4
-
18
-
-
27644508954
-
APSS: Proactive Secret Sharing in Asynchronous Systems
-
L. Zhou, F. B. Schneider, and R. van Renesse, "APSS: Proactive Secret Sharing in Asynchronous Systems," ACM Trans. Inf. Syst. Secur., vol. 8, no. 3, pp. 259-286, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.3
, pp. 259-286
-
-
Zhou, L.1
Schneider, F.B.2
van Renesse, R.3
-
19
-
-
57549114280
-
Mobile Proactive Secret Sharing
-
Extended Draft
-
D. A. Schultz, B. Liskov, and M. Liskov, "Mobile Proactive Secret Sharing," in PODC'08, 2008, p. 458, (Extended Draft).
-
(2008)
PODC'08
, pp. 458
-
-
Schultz, D.A.1
Liskov, B.2
Liskov, M.3
-
20
-
-
0011797655
-
An Asynchronous [(n-1)/3]-Resilient Consensus Protocol
-
G. Bracha, "An Asynchronous [(n-1)/3]-Resilient Consensus Protocol," in PODC'84, 1984, pp. 154-162.
-
(1984)
PODC'84
, pp. 154-162
-
-
Bracha, G.1
-
21
-
-
0023994903
-
Consensus in the Presence of Partial Synchrony
-
C. Dwork, N. A. Lynch, and L. J. Stockmeyer, "Consensus in the Presence of Partial Synchrony," Journal of ACM, vol. 35, no. 2, pp. 288-323, 1988.
-
(1988)
Journal of ACM
, vol.35
, Issue.2
, pp. 288-323
-
-
Dwork, C.1
Lynch, N.A.2
Stockmeyer, L.J.3
-
22
-
-
0022045868
-
Impossibility of Distributed Consensus with One Faulty Process
-
M. J. Fischer, N. A. Lynch, and M. Paterson, "Impossibility of Distributed Consensus with One Faulty Process," Journal of ACM, vol. 32, no. 2, pp. 374-382, 1985.
-
(1985)
Journal of ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.3
-
23
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery," ACM Trans. Comput. Syst., vol. 20, no. 4, pp. 398-461, 2002.
-
(2002)
ACM Trans. Comput. Syst
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
24
-
-
1542288257
-
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
-
M. Backes and C. Cachin, "Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries," in DSN'03, 2003, pp. 37-46.
-
(2003)
DSN'03
, pp. 37-46
-
-
Backes, M.1
Cachin, C.2
-
26
-
-
0027188428
-
Asynchronous Secure Computation
-
M. Ben-Or, R. Canetti, and O. Goldreich, "Asynchronous Secure Computation," in STOC'93, 1993, pp. 52-61.
-
(1993)
STOC'93
, pp. 52-61
-
-
Ben-Or, M.1
Canetti, R.2
Goldreich, O.3
-
27
-
-
84880899710
-
Secure and Efficient Asynchronous Broadcast Protocols
-
C. Cachin, K. Kursawe, F. Petzold, and V. Shoup, "Secure and Efficient Asynchronous Broadcast Protocols," in Advances in Cryptology - CRYPTO'01, 2001, pp. 524-541.
-
(2001)
Advances in Cryptology - CRYPTO'01
, pp. 524-541
-
-
Cachin, C.1
Kursawe, K.2
Petzold, F.3
Shoup, V.4
-
28
-
-
1142268843
-
Proactive Secure Message Transmission in Asynchronous Networks
-
M. Backes, C. Cachin, and R. Strobl, "Proactive Secure Message Transmission in Asynchronous Networks," in PODC'03, 2003, pp. 223-232.
-
(2003)
PODC'03
, pp. 223-232
-
-
Backes, M.1
Cachin, C.2
Strobl, R.3
-
29
-
-
0003070483
-
Fault-tolerant Broadcasts and Related Problems
-
2nd Ed, ACM Press
-
V. Hadzilacos and S. Toueg, "Fault-tolerant Broadcasts and Related Problems," in Distributed systems (2nd Ed.). ACM Press, 1993, pp. 97-145.
-
(1993)
Distributed systems
, pp. 97-145
-
-
Hadzilacos, V.1
Toueg, S.2
|