Secure Message Transmission with Small Public Discussion
暂无分享,去创建一个
[1] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[2] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[3] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[4] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[5] Jonathan Katz,et al. On Expected Constant-Round Protocols for Byzantine Agreement , 2006, CRYPTO.
[6] Reihaneh Safavi-Naini,et al. On Optimal Secure Message Transmission by Public Discussion , 2009, IEEE Transactions on Information Theory.
[7] Eli Upfal,et al. Fault tolerance in networks of bounded degree , 1986, STOC '86.
[8] Hosame Abu-Amara,et al. Efficient Perfectly Secure Message Transmission in Synchronous Networks , 1996, Inf. Comput..
[9] Yoram Moses,et al. Fully Polynomial Byzantine Agreement for n > 3t Processors in t + 1 Rounds , 1998, SIAM J. Comput..
[10] David Zuckerman,et al. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .
[11] Kaoru Kurosawa,et al. Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme , 2009, IEEE Transactions on Information Theory.
[12] Ronald Cramer,et al. Asymptotically Optimal Two-Round Perfectly Secure Message Transmission , 2006, CRYPTO.
[13] K. Srinathan,et al. Optimal Perfectly Secure Message Transmission , 2004, CRYPTO.
[14] Rafail Ostrovsky,et al. Almost-Everywhere Secure Computation , 2008, EUROCRYPT.
[15] Kaoru Kurosawa,et al. Almost Secure (1-Round, n-Channel) Message Transmission Scheme , 2009, ICITS.
[16] K. Srinathan,et al. Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality , 2010, Int. J. Appl. Cryptogr..
[17] Silvio Micali,et al. An Optimal Probabilistic Protocol for Synchronous Byzantine Agreement , 1997, SIAM J. Comput..
[18] Matthew K. Franklin,et al. Secure Communications in Minimal Connectivity Models , 1998, EUROCRYPT.
[19] Leslie Lamport,et al. A fast mutual exclusion algorithm , 1987, TOCS.
[20] Eli Upfal. Tolerating linear number of faults in networks of bounded degree , 1992, PODC '92.
[21] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[22] K. Srinathan,et al. On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Matthias Fitzi,et al. Towards Optimal and Efficient Perfectly Secure Message Transmission , 2007, TCC.
[24] Piotr Berman,et al. Fast consensus in networks of bounded degree , 2005, Distributed Computing.
[25] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.