Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Yunghsiang Sam Han,et al. Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission , 2008, IEEE Transactions on Dependable and Secure Computing.
[3] Toshinori Araki. Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption , 2008, ICITS.
[4] Don Coppersmith,et al. Matrix multiplication via arithmetic progressions , 1987, STOC.
[5] Reihaneh Safavi-Naini,et al. Optimal message transmission protocols with flexible parameters , 2011, ASIACCS '11.
[6] Gabriel Bracha,et al. An O(log n) expected rounds randomized byzantine generals protocol , 1987, JACM.
[7] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[8] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[9] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Jiang Wu,et al. Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission , 2011, IEEE Transactions on Dependable and Secure Computing.
[12] Kaoru Kurosawa,et al. Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme , 2009, IEEE Transactions on Information Theory.
[13] K. Srinathan,et al. Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.
[14] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[15] Yongge Wang,et al. Robust key establishment in sensor networks , 2004, SGMD.
[16] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] S. Varadhan,et al. A probabilistic approach to , 1974 .
[18] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[19] Reihaneh Safavi-Naini,et al. Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes , 2010, AFRICACRYPT.
[20] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[21] Deep Medhi,et al. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[22] Kaoru Kurosawa,et al. Almost Secure (1-Round, n-Channel) Message Transmission Scheme , 2009, ICITS.
[23] K. Srinathan,et al. Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality , 2010, Int. J. Appl. Cryptogr..
[24] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[25] Matthias Fitzi,et al. Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.
[26] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[27] Hosame Abu-Amara,et al. Efficient Perfectly Secure Message Transmission in Synchronous Networks , 1996, Inf. Comput..
[28] Ronald Cramer,et al. Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.
[29] Reihaneh Safavi-Naini,et al. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper) , 2011, Financial Cryptography.