Authenticated broadcast with a partially compromised public-key infrastructure
From MaRDI portal
Publication:2637312
DOI10.1016/j.ic.2013.11.003zbMath1283.94092MaRDI QIDQ2637312
Arkady Yerukhimovich, Ranjit Kumaresan, S. Dov Gordon, Jonathan N. Katz
Publication date: 11 February 2014
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2013.11.003
94A60: Cryptography
68M12: Network protocols
94A62: Authentication, digital signatures and secret sharing
Related Items
State machine replication under changing network conditions, Almost-everywhere secure computation with edge corruptions
Cites Work
- Player-Centric Byzantine Agreement
- Authenticated Algorithms for Byzantine Agreement
- From partial consistency to global broadcast
- Authenticated Byzantine Generals in Dual Failure Model
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Reaching Agreement in the Presence of Faults
- The Byzantine Generals Problem
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology - EUROCRYPT 2004