Perfectly secure message transmission

From MaRDI portal
Publication:4033834

DOI10.1145/138027.138036zbMath0774.68017OpenAlexW2092148937MaRDI QIDQ4033834

Orli Waarts, Danny Dolev, Cynthia Dwork, Mordechai M. Yung

Publication date: 16 May 1993

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/138027.138036




Related Items (91)

Learning the state of nature in repeated games with incomplete information and signalsOblivious transfer in incomplete networksTopology-hiding computation beyond semi-honest adversariesAN APPLICATION OF ST-NUMBERING TO SECRET KEY AGREEMENTGraph-theoretic design and analysis of key predistribution schemesPerfectly reliable message transmissionPerfectly Secure Message Transmission in Two RoundsImproving the round complexity of VSS in point-to-point networksThe Byzantine Generals Problem in Generic and Wireless NetworksMathematical problems in cryptologyReliable broadcast with respect to topology knowledgeIs information-theoretic topology-hiding computation possible?Coordinated consensus in dynamic networksError-free multi-valued consensus with byzantine failuresDistributed graph coloring in a few roundsMIS on treesToward more localized local algorithmsThe complexity of robust atomic storageResilience of mutual exclusion algorithms to transient memory faultsThe impact of memory models on software reliability in multiprocessorsA complexity separation between the cache-coherent and distributed shared memory modelsFrom bounded to unbounded concurrency objects and backThe space complexity of long-lived and one-shot timestamp implementationsLocally checkable proofsFault-tolerant spannersAdaptively secure broadcast, revisitedScalable rational secret sharingAnalyzing consistency properties for fun and profitTransforming worst-case optimal solutions for simultaneous tasks into all-case optimal solutionsOptimal-time adaptive strong renaming, with applications to countingThe round complexity of distributed sortingA tight unconditional lower bound on distributed randomwalk computationMinimum congestion mapping in a cloudConflict on a communication channelStability of a peer-to-peer communication systemTight bounds on information dissemination in sparse mobile networksTime-efficient randomized multiple-message broadcast in radio networksFaster information dissemination in dynamic networks via network codingOn one-round reliable message transmissionInterplay between (im)perfectness, synchrony and connectivity: the case of reliable message transmissionRound-Optimal Perfectly Secret Message Transmission with Linear Communication ComplexityMechanism design and communication networksBroadcast (and Round) Efficient Verifiable Secret SharingOn minimal connectivity requirements for secure message transmission in directed networksCorrection to: ``Topology-hiding communication from minimal assumptionsGraph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and surveyProbabilistic reliability and privacy of communication using multicast in general neighbor networksAttaining GOD beyond honest majority with friends and foesAlmost-everywhere secure computation with edge corruptionsEfficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile AdversarySecure message transmission in asynchronous networksInformation-theoretically secure MPC against mixed dynamic adversariesDistributed Merkle's puzzlesOn private computation in incomplete networksSecure message transmission on directed networksOrder optimal information spreading using algebraic gossipUnconditionally Reliable and Secure Message Transmission in Directed Networks RevisitedA logical approach to multilevel security of probabilistic systemsCryptography and cryptographic protocolsUsing quantum key distribution for cryptographic purposes: a surveyError decodable secret sharing and one-round perfectly secure message transmission for general adversary structuresRealistic versus Rational Secret SharingPerfectly Secure Message Transmission Against Independent Rational AdversariesMust the communication graph of MPC protocols be an expander?Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationSecure Message Transmission by Public Discussion: A Brief SurveyFast and compact self-stabilizing verification, computation, and fault detection of an MSTABSOLUTELY SECURE MESSAGE TRANSMISSION USING A KEY SHARING GRAPHEfficient robust secret sharing from expander graphsIncentives and the structure of communicationEfficient Statistical Asynchronous Verifiable Secret Sharing with Optimal ResilienceCryptanalysis of Secure Message Transmission Protocols with FeedbackEfficient asynchronous verifiable secret sharing and multiparty computationBeyond honest majority: the round complexity of fair and robust multi-party computationStructuring unreliable radio networksByzantine agreement with homonymsDistributed deterministic edge coloring using bounded neighborhood independenceCompact policy routingEfficient reliable communication over partially authenticated networksOn Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous NetworksWhat is the Future of Cryptography?Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and OptimalityPerfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold AdversaryByzantine Agreement Using Partial AuthenticationNetwork Oblivious TransferRound-efficient perfectly secure message transmission scheme against general adversarySecure Message Transmission in Asynchronous Directed GraphsReliable communication over partially authenticated networksPerfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed AdversaryXhealQuantum verifiable protocol for secure modulo zero-sum randomness




This page was built for publication: Perfectly secure message transmission