메뉴 건너뛰기




Volumn 1403, Issue , 1998, Pages 346-360

Secure communication in minimal connectivity models

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; CRYPTOGRAPHY; INFORMATION THEORY; SECURE COMMUNICATION;

EID: 84957653101     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0054138     Document Type: Conference Paper
Times cited : (26)

References (17)
  • 1
    • 0024861622 scopus 로고
    • On the complexity of radio communication
    • [ABLP89]
    • [ABLP89] N. Alon, A. Bar-Noy, N. Linial, and D. Peleg, "On the complexity of radio communication," ACM STOC, 1989, 274-285.
    • (1989) ACM STOC , pp. 274-285
    • Alon, N.1    Bar-Noy, A.2    Linial, N.3    Peleg, D.4
  • 2
    • 85032862464 scopus 로고    scopus 로고
    • Multiparty protocols tolerating half faulty processors
    • [Bea89]
    • [Bea89] D. Beaver, "Multiparty protocols tolerating half faulty processors," Proc. Crypto ’89, 560-572.
    • Proc. Crypto ’89 , pp. 560-572
    • Beaver, D.1
  • 3
    • 0039093711 scopus 로고    scopus 로고
    • Reliable communication over partially authenticated networks
    • [BF97], Springer-Verlag LNCS 1320
    • [BF97] A. Beimel and M. Franklin, "Reliable communication over partially authenticated networks," Proc. Workshop on Distributed Algorithms (WDAG), Springer-Verlag LNCS 1320, 1997, 245-259.
    • (1997) Proc. Workshop on Distributed Algorithms (WDAG) , pp. 245-259
    • Beimel, A.1    Franklin, M.2
  • 4
    • 0027188428 scopus 로고
    • Asynchronous secure computation
    • [BCG93]
    • [BCG93] M. Ben-Or, R. Canetti, and O. Goldreich, "Asynchronous secure computation," ACM STOC, 1993, 52-61.
    • (1993) ACM STOC , pp. 52-61
    • Ben-Or, M.1    Canetti, R.2    Goldreich, O.3
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computing
    • [BGW88]
    • [BGW88] M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computing," ACM STOC, 1988, 1-10.
    • (1988) ACM STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 0022144724 scopus 로고
    • Asynchronous consensus and broadcast protocols
    • [BT85]
    • [BT85] G. Bracha and S. Toueg, "Asynchronous consensus and broadcast protocols", JACM 32(4): 824-840 (1985).
    • (1985) JACM , vol.32 , Issue.4 , pp. 824-840
    • Bracha, G.1    Toueg, S.2
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditional secure protocols
    • [CCD88]
    • [CCD88] D. Chaum, C. Crepeau, said I. Damgard, "Multiparty unconditional secure protocols," ACM STOC, 1988, 11-19.
    • (1988) ACM STOC , pp. 11-19
    • Chaum, D.1    Crepeau, C.2    Damgard, S.I.3
  • 10
    • 0009768331 scopus 로고
    • The Byzantine Generals strike again
    • [Dol82]
    • [Dol82] D. Dolev, "The Byzantine Generals strike again," J. Algorithms 3:14-30, 1982.
    • (1982) J. Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 11
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • [DDWY93]
    • [DDWY93] D. Dolev, C. Dwork, O. Waarts, and M. Yung, "Perfectly secure message transmission," JACM 40(1): 17-47, 1993.
    • (1993) JACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 12
    • 1142282324 scopus 로고
    • Secure hypergraphs: Privacy from partied broadcast
    • [FY95]
    • [FY95] M. Franklin and M. Yung, "Secure hypergraphs: privacy from partied broadcast," ACM STOC, 1995, 36-44.
    • (1995) ACM STOC , pp. 36-44
    • Franklin, M.1    Yung, M.2
  • 13
    • 0026367257 scopus 로고
    • Fault-tolerant computation in the full information model
    • [GGL91]
    • [GGL91] O. Goldreich, S. Goldwasser, and N. Linial, "Fault-tolerant computation in the full information model," IEEE FOCS, 1991, 447-457.
    • (1991) IEEE FOCS , pp. 447-457
    • Goldreich, O.1    Goldwasser, S.2    Linial, N.3
  • 14
    • 84976810569 scopus 로고
    • Reaching Agreement in the Presence of Faults
    • [PSL80]
    • [PSL80] M. Pease, R. Shostak, and L. Lamport, "Reaching Agreement in the Presence of Faults", JACM 27(2): 228-234, 1980.
    • (1980) JACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 16
    • 0028542745 scopus 로고
    • Robust sharing of secrets when the dealer is honest or faulty
    • [Rab94]
    • [Rab94] T. Rabin, "Robust sharing of secrets when the dealer is honest or faulty," JACM 41(6):1089-1109, 1994.
    • (1994) JACM , vol.41 , Issue.6 , pp. 1089-1109
    • Rabin, T.1
  • 17
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • [RB89]
    • [RB89] T. Rabin and M. Ben-Or, "Verifiable secret sharing and multiparty protocols with honest majority," ACM STOC, 1989, 73-85.
    • (1989) ACM STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.