Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
From MaRDI portal
Publication:5458600
DOI10.1007/978-3-540-78967-3_19zbMATH Open1149.94324OpenAlexW1499281737MaRDI QIDQ5458600FDOQ5458600
Authors: Kaoru Kurosawa, Kazuhiro Suzuki
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_19
Recommendations
- Perfectly Secure Message Transmission in Two Rounds
- Towards Optimal and Efficient Perfectly Secure Message Transmission
- Round-efficient perfectly secure message transmission scheme against general adversary
- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
- Advances in Cryptology – CRYPTO 2004
Cited In (19)
- Practical unconditionally secure two-channel message authentication
- Synchronous perfectly secure message transmission with optimal asynchronous fallback guarantees
- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption
- Cryptanalysis of secure message transmission protocols with feedback
- Towards Optimal and Efficient Perfectly Secure Message Transmission
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
- Network-agnostic perfectly secure message transmission revisited
- Perfectly secure message transmission against rational timid adversaries
- Round-efficient perfectly secure message transmission scheme against general adversary
- Perfectly Secure Message Transmission in Two Rounds
- Two-round perfectly secure message transmission with optimal transmission rate
- Secure message transmission in asynchronous networks
- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
- On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
- Two-message key exchange with strong security from ideal lattices
- Secure message transmission by public discussion: a brief survey
- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
- Private message transmission using disjoint paths
- Perfectly secure message transmission against independent rational adversaries
This page was built for publication: Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458600)