메뉴 건너뛰기




Volumn , Issue , 2012, Pages 181-190

Scalable and secure polling in dynamic distributed networks

Author keywords

byzantine agreement; distributed; dynamic networks; multiparty computation; polling; privacy

Indexed keywords

BYZANTINE AGREEMENT; DISTRIBUTED; DYNAMIC NETWORK; MULTIPARTY COMPUTATION; POLLING;

EID: 84874299376     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2012.63     Document Type: Conference Paper
Times cited : (7)

References (43)
  • 6
    • 0001683636 scopus 로고
    • Authenticated algorithms for byzantine agreement
    • D. Dolev and H. R. Strong, "Authenticated algorithms for byzantine agreement", SIAM Journal on Computing, vol. 12, no. 4, pp. 656-666, 1983.
    • (1983) SIAM Journal on Computing , vol.12 , Issue.4 , pp. 656-666
    • Dolev, D.1    Strong, H.R.2
  • 7
    • 0021976090 scopus 로고
    • Bounds on information exchange for byzantine agreement
    • Jan.
    • Danny Dolev and Rüdiger Reischuk, "Bounds on information exchange for byzantine agreement", J. ACM, vol. 32, no. 1, pp. 191-204, Jan. 1985.
    • (1985) J. ACM , vol.32 , Issue.1 , pp. 191-204
    • Dolev, D.1    Reischuk, R.2
  • 8
    • 67449124556 scopus 로고    scopus 로고
    • Towards a scalable and robust DHT
    • B. Awerbuch and C. Scheideler, "Towards a Scalable and Robust DHT", Theory of Computing Systems, vol. 45, no. 2, pp. 234-260, 2009.
    • (2009) Theory of Computing Systems , vol.45 , Issue.2 , pp. 234-260
    • Awerbuch, B.1    Scheideler, C.2
  • 9
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • I. Damg ard and M. Jurik, "A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System", in Public Key Cryptography (PKC'01), 2001, pp. 119-136.
    • (2001) Public Key Cryptography (PKC'01) , pp. 119-136
    • Damg Ard, I.1    Jurik, M.2
  • 10
    • 76649119750 scopus 로고    scopus 로고
    • From almost everywhere to everywhere: Byzantine agreement with -o(n3/2) bits
    • V. King and J. Saia, "From almost everywhere to everywhere: Byzantine agreement with -o(n3/2) bits", Distributed Computing, pp. 464-478, 2009.
    • (2009) Distributed Computing , pp. 464-478
    • King, V.1    Saia, J.2
  • 11
    • 51649126675 scopus 로고    scopus 로고
    • Lower bound for scalable byzantine agreement
    • D. Holtby, B.M. Kapron, and V. King, "Lower bound for scalable byzantine agreement", Distributed Computing, vol. 21, no. 4, pp. 239-248, 2008.
    • (2008) Distributed Computing , vol.21 , Issue.4 , pp. 239-248
    • Holtby, D.1    Kapron, B.M.2    King, V.3
  • 19
    • 77954867373 scopus 로고    scopus 로고
    • Towards worst-case churn resistant peer-to-peer systems
    • May
    • Fabian Kuhn, Stefan Schmid, and Roger Wattenhofer, "Towards worst-case churn resistant peer-to-peer systems", Distributed Computing Journal (DC), vol. 22, no. 4, pp. 249-267, May 2010.
    • (2010) Distributed Computing Journal (DC) , vol.22 , Issue.4 , pp. 249-267
    • Kuhn, F.1    Schmid, S.2    Wattenhofer, R.3
  • 22
    • 85032862464 scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • Lecture Notes in Computer Science
    • D. Beaver, "Multiparty protocols tolerating half faulty processors", in Advances in Cryptology (CRYPTO'89), 1990, vol. 435 of Lecture Notes in Computer Science, pp. 560-572.
    • (1990) Advances in Cryptology (CRYPTO'89) , vol.435 , pp. 560-572
    • Beaver, D.1
  • 25
  • 29
    • 79952946379 scopus 로고    scopus 로고
    • On achieving the best of both worlds in secure multiparty computation
    • Y. Ishai, J. Katz, E. Kushilevitz, Y. Lindell, and E. Petrank, "On achieving the best of both worlds in secure multiparty computation", SIAM journal on computing, vol. 40, no. 1, pp. 122-141, 2011.
    • (2011) SIAM Journal on Computing , vol.40 , Issue.1 , pp. 122-141
    • Ishai, Y.1    Katz, J.2    Kushilevitz, E.3    Lindell, Y.4    Petrank, E.5
  • 33
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key Cryptosystems based on Composite Degree Residuosity Classes", Advances in Cryptology (EUROCRYPT'99), 1999.
    • (1999) Advances in Cryptology (EUROCRYPT'99)
    • Paillier, P.1
  • 38
    • 82955184587 scopus 로고    scopus 로고
    • Computational verifiable secret sharing revisited
    • Dong Hoon Lee and Xiaoyun Wang, Eds. of Lecture Notes in Computer Science, Springer
    • Arpita Patra Michael Backes, Aniket Kate, "Computational verifiable secret sharing revisited", in ASIACRYPT, Dong Hoon Lee and Xiaoyun Wang, Eds. 2011, vol. 7073 of Lecture Notes in Computer Science, pp. 590-609, Springer.
    • (2011) ASIACRYPT , vol.7073 , pp. 590-609
    • Patra, A.1    Backes, M.2    Kate, A.3
  • 39
    • 85036605801 scopus 로고    scopus 로고
    • Distributed paillier cryptosystem without trusted dealer
    • T. Nishide and K. Sakurai, "Distributed Paillier Cryptosystem without Trusted Dealer", Information Security Applications, pp. 44-60, 2011.
    • (2011) Information Security Applications , pp. 44-60
    • Nishide, T.1    Sakurai, K.2
  • 41
    • 78751674305 scopus 로고    scopus 로고
    • Load balanced scalable byzantine agreement through quorum building, with full information
    • V. King, S. Lonargan, J. Saia, and A. Trehan, "Load balanced scalable byzantine agreement through quorum building, with full information", Distributed Computing and Networking, pp. 203-214, 2011.
    • (2011) Distributed Computing and Networking , pp. 203-214
    • King, V.1    Lonargan, S.2    Saia, J.3    Trehan, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.