메뉴 건너뛰기




Volumn 2332, Issue , 2002, Pages 502-517

Perfectly secure message transmission revisited

Author keywords

Network connectivity; Network security; Privacy; Reliability

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; DATA PRIVACY; MULTICASTING; RELIABILITY; SECURE COMMUNICATION;

EID: 84888077711     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46035-7_33     Document Type: Conference Paper
Times cited : (78)

References (15)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computing
    • ACM Press
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computing. In: Proc. ACM STOC, ’88, pages 1–10, ACM Press, 1988.
    • (1988) Proc. ACM STOC, ’88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 84898947315 scopus 로고
    • Multiparty unconditional secure protocols
    • ACM Press
    • D. Chaum, C. Crepeau, and I. Damgard. Multiparty unconditional secure protocols. In: Proc. ACM STOC ’88, pages 11–19, ACM Press, 1988.
    • (1988) Proc. ACM STOC ’88 , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, I.3
  • 3
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev. The Byzantine generals strike again. J. of Algorithms, 3:14–30, 1982.
    • (1982) J of Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 4
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. J. of the ACM, 40(1):17–47, 1993.
    • (1993) J of the ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 6
    • 0003640244 scopus 로고    scopus 로고
    • Secure communication in minimal connectivity models
    • M. Franklin and R.Wright. Secure communication in minimal connectivity models. Journal of Cryptology, 13(1):9–30, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 9-30
    • Franklin, M.1
  • 7
    • 1142282324 scopus 로고
    • Secure hypergraphs: Privacy from partial broadcast
    • ACM Press
    • M. Franklin and M. Yung. Secure hypergraphs: privacy from partial broadcast. In: Proc. ACM STOC ’95, pages 36–44, ACM Press, 1995.
    • (1995) Proc. ACM STOC ’95 , pp. 36-44
    • Franklin, M.1    Yung, M.2
  • 9
    • 1542674248 scopus 로고    scopus 로고
    • Fault-tolerant computation in the full information model
    • O. Goldreich, S. Goldwasser, and N. Linial. Fault-tolerant computation in the full information model. SIAM J. Comput. 27(2):506–544, 1998.
    • (1998) SIAM J. Comput , vol.27 , Issue.2 , pp. 506-544
    • Goldreich, O.1    Goldwasser, S.2    Linial, N.3
  • 12
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • September
    • R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes. Comm. ACM, 24(9):583–584, September 1981.
    • (1981) Comm. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 13
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • T. Rabin. Robust sharing of secrets when the dealer is honest or faulty. J. of the ACM, 41(6):1089–1109, 1994.
    • (1994) J of the ACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 14
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • ACM Press
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. ACM STOC ’89, pages 73–85, ACM Press, 1989.
    • (1989) Proc. ACM STOC ’89 , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 15
    • 1142270158 scopus 로고    scopus 로고
    • Secure communication in multicast channels: The answer to Franklin and Wright’s question
    • Y. Wang and Y. Desmedt. Secure communication in multicast channels: the answer to Franklin and Wright’s question. J. of Cryptology, 14(2):121–135, 2001.
    • (2001) J of Cryptology , vol.14 , Issue.2 , pp. 121-135
    • Wang, Y.1    Desmedt, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.