Sciweavers

124 search results - page 1 / 25
» Perfectly Secure Message Transmission
Sort
View
AISS
2010
115views more  AISS 2010»
13 years 2 months ago
Network Connection and Perfectly Secure Message Transmission on Wireless Mobile Networks
In this paper we proposed perfectly secure message transmission for reliable and secure communications in order to ensure that an adversary cannot obtain information (in the infor...
Sun-Young Lee
EUROCRYPT
2008
Springer
13 years 6 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
ACISP
2007
Springer
13 years 8 months ago
On Proactive Perfectly Secure Message Transmission
This paper studies the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of a Byzantine mobile adversary that may move from...
Kannan Srinathan, Prasad Raghavendra, C. Pandu Ran...
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan