1990
DOI: 10.1007/3-540-46885-4_33
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Disrupters in the DC Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

1993
1993
2018
2018

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 2 publications
0
28
0
Order By: Relevance
“…It was shown in [25] how to set up a PSS using global broadcast channels, where the dining-cryptographers protocol [5,4] was used. Obtaining a PSS from a common random source was considered in [15,16], but only with respect to three players and one particular probability distribution.…”
Section: Pseudo-signature Schemes (Pss)mentioning
confidence: 99%
“…It was shown in [25] how to set up a PSS using global broadcast channels, where the dining-cryptographers protocol [5,4] was used. Obtaining a PSS from a common random source was considered in [15,16], but only with respect to three players and one particular probability distribution.…”
Section: Pseudo-signature Schemes (Pss)mentioning
confidence: 99%
“…We make use of an Untraceable Sending protocol as introduced by [Cha88] and further elaborated by [BB89] and [pfi891.…”
Section: Introductionmentioning
confidence: 99%
“…(See [14] for a good bibliography.) DC-nets, by contrast, have remained relatively neglected, apart from a small scattering of papers, e.g., [1,2,11,21,22]. One reason for this is perhaps that DC-nets, unlike mixnets, cannot operate by proxy; in particular, the players operating a DC-net must be identical with those providing input.…”
Section: Introductionmentioning
confidence: 99%