Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission
暂无分享,去创建一个
[1] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[2] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[3] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[4] C. Pandu Rangan,et al. Constant phase efficient protocols for secure message transmission in directed networks , 2007, PODC '07.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] K. Srinathan,et al. Possibility and complexity of probabilistic reliable communication in directed networks , 2006, PODC '06.
[7] Nancy A. Lynch,et al. Impossibility of distributed consensus with one faulty process , 1985, JACM.
[8] Yvo Desmedt,et al. Cryptanalysis of Secure Message Transmission Protocols with Feedback , 2009, ICITS.
[9] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[10] C. Pandu Rangan,et al. Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited , 2008, SCN.
[11] K. Srinathan,et al. On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks , 2009, ICDCN.
[12] Moti Yung,et al. Perfectly secure message transmission , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[13] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[14] K. Srinathan,et al. Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT , 2010, DISC.
[15] K. Srinathan,et al. Unconditionally reliable message transmission in directed networks , 2008, SODA '08.
[16] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2008, IEEE Trans. Inf. Theory.
[17] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.