2012
DOI: 10.1007/978-3-642-27576-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…For this network our approach will need q ≥ 16000, q 4 computation, the list size will be q 3 and δ = 42 q 4 = 6(10 −6 ), where q is the base field size. For q = 16000, the δ for the protocol in [22] is 0.0263. whereas, δ for the protocol in [21] is not defined (the protocol needs larger field size). To have the same δ as our protocol, [21] needs field size to be 1.2 × 10 14 .…”
Section: Advantages Of the Approachmentioning
confidence: 99%
See 4 more Smart Citations
“…For this network our approach will need q ≥ 16000, q 4 computation, the list size will be q 3 and δ = 42 q 4 = 6(10 −6 ), where q is the base field size. For q = 16000, the δ for the protocol in [22] is 0.0263. whereas, δ for the protocol in [21] is not defined (the protocol needs larger field size). To have the same δ as our protocol, [21] needs field size to be 1.2 × 10 14 .…”
Section: Advantages Of the Approachmentioning
confidence: 99%
“…This protocol uses a complex combination of secret sharing by the sender and elaborate verification of the received information by the receiver to determine the correct message block. There are two optimal and efficient 1-round (0, δ)-SMT protocols for N = 2t + 1 [14,22]. The protocol in [14] is based on the 1-round δ-RMT protocol of [18] and has similar complexity.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations