Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science
DOI: 10.1109/fscs.1990.89522
|View full text |Cite
|
Sign up to set email alerts
|

Perfectly secure message transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
116
0

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(116 citation statements)
references
References 7 publications
0
116
0
Order By: Relevance
“…Important work has already been done on that topic (totally independently from QKD networks considerations) [122,123,124,125]. This work strikingly fits with the unconditional security offered by QKD networks, and powerful information-theoretic tools have been developed to guarantee the security of such networks even when some fraction of the network nodes are corrupted.…”
Section: Classical Cryptographic Primitives Built On Top Of Qkd Networkmentioning
confidence: 88%
“…Important work has already been done on that topic (totally independently from QKD networks considerations) [122,123,124,125]. This work strikingly fits with the unconditional security offered by QKD networks, and powerful information-theoretic tools have been developed to guarantee the security of such networks even when some fraction of the network nodes are corrupted.…”
Section: Classical Cryptographic Primitives Built On Top Of Qkd Networkmentioning
confidence: 88%
“…Over the last three decades, active research has been carried out in this area and many interesting and significant results have been obtained dealing with high efficiency, security against general adversaries, security against mixed type of corruptions, long-term security, provable security, etc (see [18,24,9,17,41,20,10,16,42,26,28,32,35,4,6] and their references). However, almost all these solutions are for the synchronous model, where it is assumed that every message in the network is delayed by a given constant.…”
Section: Verifiable Secret Sharing (Vss)mentioning
confidence: 99%
“…In [6], Dolev et al initiate the study of message transmission protocols which provide both perfect secrecy and perfect resiliency by abstracting the network as a collection of n channels (corresponding to vertex-disjoint paths) between two synchronized non-faulty processors S and R. Franklin et al [8] show that the connectivity requirements for Dolev et al's problem stay the same even when privacy is not required and there is a fairly large probability of failure of reliability (this is the general problem of URMT we have described above). Adopting Dolev et al's network abstraction, Ashish et al [4] study several variants of message transmission in asynchronous networks.…”
Section: Related Workmentioning
confidence: 99%