On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Reliable Communication over Partially Authenticated Networks , 1997, WDAG.
[2] Kaoru Kurosawa,et al. Some Basic Properties of General Nonperfect Secret Sharing Schemes , 1998, J. Univers. Comput. Sci..
[3] K. Srinathan,et al. Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission , 2006, INDOCRYPT.
[4] K. Srinathan,et al. Asynchronous Secure Communication Tolerating Mixed Adversaries , 2002, ASIACRYPT.
[5] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[6] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[7] Hosame Abu-Amara,et al. Efficient Perfectly Secure Message Transmission in Synchronous Networks , 1996, Inf. Comput..
[8] Alfredo De Santis,et al. On the size of shares for secret sharing schemes , 1991, Journal of Cryptology.
[9] K. Srinathan,et al. On perfectly secure communication over arbitrary networks , 2002, PODC '02.
[10] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[11] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[12] Kaoru Kurosawa,et al. Nonperfect Secret Sharing Schemes and Matroids , 1994, EUROCRYPT.
[13] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[14] Carles Padró,et al. Secret Sharing Schemes with Detection of Cheaters for a General Access Structure , 1999, Des. Codes Cryptogr..
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Carles Padró,et al. Lower bounds on the information rate of secret sharing schemes with homogeneous access structure , 2002, Inf. Process. Lett..
[17] Ronald Cramer,et al. Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.
[18] K. Srinathan,et al. Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.
[19] Matthew K. Franklin,et al. Secure hypergraphs: privacy from partial broadcast , 1995, STOC '95.
[20] Ivan Damgård,et al. On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase , 2001, CRYPTO.