Perfectly Secure Message Transmission Revisited (Extended Abstract)
暂无分享,去创建一个
[1] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[2] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[3] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[4] D. R. Fulkerson,et al. Flows in Networks. , 1964 .
[5] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[6] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[7] Nathan Linial,et al. Fault-Tolerant Computation in the Full Information Model , 1998, SIAM J. Comput..
[8] Tal Rabin,et al. Robust sharing of secrets when the dealer is honest or cheating , 1994, JACM.
[9] Yongge Wang,et al. Secure Communication in Multicast Channels: The Answer to Franklin and Wright's Question , 2001, Journal of Cryptology.
[10] F. MacWilliams,et al. Codes which detect deception , 1974 .
[11] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[12] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[13] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[14] Matthew K. Franklin,et al. Secure hypergraphs: privacy from partial broadcast , 1995, STOC '95.