Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation
暂无分享,去创建一个
[1] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[2] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[3] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[4] Moti Yung,et al. Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.
[5] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[6] Shlomi Dolev,et al. Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Allan Tomlinson,et al. Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.
[8] H. P. Zeige,et al. Cascade Synthesis of Finite-State Machines , 2004 .
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[11] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[12] J. Rhodes,et al. Algebraic theory of machines. I. Prime decomposition theorem for finite semigroups and machines , 1965 .
[13] Yvo Desmedt,et al. Perfectly Secure Message Transmission , 2011, Encyclopedia of Cryptography and Security.
[14] Moni Naor,et al. Adaptively secure multi-party computation , 1996, STOC '96.
[15] Chrystopher L. Nehaniv,et al. Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11) , 2004 .
[16] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.