“…Over the last three decades, active research has been carried out in this area and many interesting and significant results have been obtained dealing with high efficiency, security against general adversaries, security against mixed type of corruptions, long-term security, provable security, etc (see [18,24,9,17,41,20,10,16,42,26,28,32,35,4,6] and their references). However, almost all these solutions are for the synchronous model, where it is assumed that every message in the network is delayed by a given constant.…”