메뉴 건너뛰기




Volumn , Issue , 2013, Pages 2404-2408

Secure network coding for distributed secret sharing with low communication cost

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION COMPLEXITY; COMMUNICATION COST; CRYPTOGRAPHIC PROTOCOLS; DIRECT COMMUNICATIONS; GENERAL NETWORKS; INFORMATION-THEORETIC LOWER BOUNDS; SECURE NETWORK CODING; THRESHOLD SECRET SHARING;

EID: 84890348734     PISSN: 21578095     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2013.6620657     Document Type: Conference Paper
Times cited : (13)

References (13)
  • 1
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret, " Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 2
    • 0002531104 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation, " in ACM STOC, 1988.
    • (1988) ACM STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 85030460443 scopus 로고
    • A threshold cryptosystem without a trusted party
    • T. Pedersen, "A threshold cryptosystem without a trusted party, " in Advances in Cryptology-EUROCRYPT, 1991, pp. 522-526.
    • (1991) Advances in Cryptology-EUROCRYPT , pp. 522-526
    • Pedersen, T.1
  • 5
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts, and M. Yung, "Perfectly secure message transmission, " Journal of the ACM, vol. 40, no. 1, pp. 17-47, 1993.
    • (1993) Journal of the ACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 6
    • 78650893906 scopus 로고    scopus 로고
    • Secure network coding on a wiretap network
    • Jan
    • N. Cai and R. Yeung, "Secure network coding on a wiretap network, " IEEE Trans. on Inf. Th., Jan. 2011.
    • (2011) IEEE Trans. on Inf. Th.
    • Cai, N.1    Yeung, R.2
  • 8
    • 77957857386 scopus 로고    scopus 로고
    • Network codes resilient to jamming and eavesdropping
    • H. Yao, D. Silva, S. Jaggi, and M. Langberg, "Network codes resilient to jamming and eavesdropping, " in NetCod, 2010.
    • (2010) NetCod
    • Yao, H.1    Silva, D.2    Jaggi, S.3    Langberg, M.4
  • 9
    • 77950848164 scopus 로고    scopus 로고
    • Secure error-correcting (sec) network codes
    • C. Ngai and R. Yeung, "Secure error-correcting (sec) network codes, " in NetCod, 2009.
    • (2009) NetCod
    • Ngai, C.1    Yeung, R.2
  • 13
    • 79961002025 scopus 로고    scopus 로고
    • Optimal exact-regenerating codes for the MSR and MBR points via a product-matrix construction
    • Aug
    • K. V. Rashmi, N. B. Shah, and P. V. Kumar, "Optimal exact-regenerating codes for the MSR and MBR points via a product-matrix construction, " IEEE Trans. Inf. Th., Aug. 2011.
    • (2011) IEEE Trans. Inf. Th.
    • Rashmi, K.V.1    Shah, N.B.2    Kumar, P.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.