Sciweavers

3 search results - page 1 / 1
» Round Complexity of Authenticated Broadcast with a Dishonest...
Sort
View
FOCS
2007
IEEE
13 years 11 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
CRYPTO
2006
Springer
104views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Random Selection with an Adversarial Majority
Abstract. We consider the problem of random selection, where p players follow a protocol to jointly select a random element of a universe of size n. However, some of the players ma...
Ronen Gradwohl, Salil P. Vadhan, David Zuckerman
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 2 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig