Authenticated broadcast with a partially compromised public-key infrastructure
From MaRDI portal
Publication:2637312
DOI10.1016/j.ic.2013.11.003zbMath1283.94092OpenAlexW2074058467MaRDI QIDQ2637312
Arkady Yerukhimovich, Ranjit Kumaresan, S. Dov Gordon, Jonathan N. Katz
Publication date: 11 February 2014
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2013.11.003
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
State machine replication under changing network conditions ⋮ Almost-everywhere secure computation with edge corruptions
Cites Work
- Player-Centric Byzantine Agreement
- Authenticated Algorithms for Byzantine Agreement
- From partial consistency to global broadcast
- Authenticated Byzantine Generals in Dual Failure Model
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Reaching Agreement in the Presence of Faults
- The Byzantine Generals Problem
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Authenticated broadcast with a partially compromised public-key infrastructure