Sign Up to like & get
recommendations!
2
Published in 2018 at "IEEE Transactions on Information Theory"
DOI: 10.1109/tit.2018.2827360
Abstract: Perfectly-secure verifiable secret sharing (VSS) and multi-party computation (MPC) protocols in asynchronous network tolerate only at most one-fourth of corruption, while their counterparts in synchronous network sustain against at most one-third corruption. Moreover property-wise, synchronous…
read more here.
Keywords:
network;
synchronous protocols;
multi party;
power hybrid ... See more keywords