Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1281100.1281153acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Constant phase efficient protocols for secure message transmission in directed networks

Published: 12 August 2007 Publication History

Abstract

No abstract available.

References

[1]
Y. Desmedt and Y. Wang. Perfectly secure message transmission revisited. Cryptology ePrint Archive, Report 2002/128, 2002. url -- http://eprint.iacr.org.
[2]
F. J. MacWilliams and N. J. A. Sloane. The Theory of Error Correcting Codes. North-Holland Publishing Company, 1978.
[3]
K. Srinathan and C. Pandu Rangan. Possibility and complexity of probabilistic reliable communication in directed networks. In Proc. of 25th PODC, pages 265--274. ACM Press, 2006.

Cited By

View all
  • (2025)Perfectly Secure Message Transmission Tolerating Omission Faults -- Possibility Feasibility, and OptimalityProceedings of the 26th International Conference on Distributed Computing and Networking10.1145/3700838.3700873(191-200)Online publication date: 4-Jan-2025
  • (2019)Perfectly secure message transmission over partially synchronous networksProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3288612(302-306)Online publication date: 4-Jan-2019
  • (2016)On perfectly secret message transmission in digraphs tolerating dual failuresProceedings of the 17th International Conference on Distributed Computing and Networking10.1145/2833312.2833327(1-10)Online publication date: 4-Jan-2016
  • Show More Cited By

Index Terms

  1. Constant phase efficient protocols for secure message transmission in directed networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PODC '07: Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
      August 2007
      424 pages
      ISBN:9781595936165
      DOI:10.1145/1281100
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 August 2007

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tag

      1. information theoretic security

      Qualifiers

      • Article

      Conference

      PODC07

      Acceptance Rates

      Overall Acceptance Rate 740 of 2,477 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Perfectly Secure Message Transmission Tolerating Omission Faults -- Possibility Feasibility, and OptimalityProceedings of the 26th International Conference on Distributed Computing and Networking10.1145/3700838.3700873(191-200)Online publication date: 4-Jan-2025
      • (2019)Perfectly secure message transmission over partially synchronous networksProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3288612(302-306)Online publication date: 4-Jan-2019
      • (2016)On perfectly secret message transmission in digraphs tolerating dual failuresProceedings of the 17th International Conference on Distributed Computing and Networking10.1145/2833312.2833327(1-10)Online publication date: 4-Jan-2016
      • (2012)Interplay between (im)perfectness, synchrony and connectivityProceedings of the 13th international conference on Distributed Computing and Networking10.1007/978-3-642-25959-3_10(138-152)Online publication date: 3-Jan-2012
      • (2011)Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversaryProceedings of the 9th international conference on Applied cryptography and network security10.5555/2025968.2025991(292-308)Online publication date: 7-Jun-2011
      • (2011)Secure message transmission in asynchronous directed graphsProceedings of the 12th international conference on Cryptology in India10.1007/978-3-642-25578-6_26(359-378)Online publication date: 11-Dec-2011
      • (2011)Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized AdversaryApplied Cryptography and Network Security10.1007/978-3-642-21554-4_17(292-308)Online publication date: 2011
      • (2010)On communication complexity of secure message transmission in directed networksProceedings of the 11th international conference on Distributed computing and networking10.5555/2018057.2018069(42-53)Online publication date: 3-Jan-2010
      • (2010)On Communication Complexity of Secure Message Transmission in Directed NetworksDistributed Computing and Networking10.1007/978-3-642-11322-2_9(42-53)Online publication date: 2010
      • (2009)Perfectly reliable and secure message transmission tolerating mobile adversaryInternational Journal of Applied Cryptography10.1504/IJACT.2009.0234671:3(200-224)Online publication date: 1-Feb-2009
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media