Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Almost-Everywhere Secure Computation - MaRDI portal

Almost-Everywhere Secure Computation

From MaRDI portal
Publication:5458599

DOI10.1007/978-3-540-78967-3_18zbMath1149.68377OpenAlexW2083796634MaRDI QIDQ5458599

Juan A. Garay, Rafail Ostrovsky

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_18




Related Items (45)

Oblivious transfer in incomplete networksCoordinated consensus in dynamic networksError-free multi-valued consensus with byzantine failuresDistributed graph coloring in a few roundsMIS on treesToward more localized local algorithmsThe complexity of robust atomic storageResilience of mutual exclusion algorithms to transient memory faultsThe impact of memory models on software reliability in multiprocessorsA complexity separation between the cache-coherent and distributed shared memory modelsFrom bounded to unbounded concurrency objects and backThe space complexity of long-lived and one-shot timestamp implementationsLocally checkable proofsFault-tolerant spannersAdaptively secure broadcast, revisitedScalable rational secret sharingAnalyzing consistency properties for fun and profitTransforming worst-case optimal solutions for simultaneous tasks into all-case optimal solutionsOptimal-time adaptive strong renaming, with applications to countingThe round complexity of distributed sortingA tight unconditional lower bound on distributed randomwalk computationMinimum congestion mapping in a cloudConflict on a communication channelStability of a peer-to-peer communication systemTight bounds on information dissemination in sparse mobile networksTime-efficient randomized multiple-message broadcast in radio networksFaster information dissemination in dynamic networks via network codingBroadcast (and Round) Efficient Verifiable Secret SharingPractical provably secure flooding for blockchainsAlmost-everywhere secure computation with edge corruptionsOrder optimal information spreading using algebraic gossipPerfectly Secure Message Transmission Against Independent Rational AdversariesMust the communication graph of MPC protocols be an expander?Secure Message Transmission by Public Discussion: A Brief SurveyFast and compact self-stabilizing verification, computation, and fault detection of an MSTEfficient robust secret sharing from expander graphsStructuring unreliable radio networksByzantine agreement with homonymsDistributed deterministic edge coloring using bounded neighborhood independenceCompact policy routingDistributed Corruption Detection in NetworksNetwork-Hiding Communication and Applications to Multi-party ProtocolsXhealQuantum verifiable protocol for secure modulo zero-sum randomnessEfficient constructions for almost-everywhere secure computation






This page was built for publication: Almost-Everywhere Secure Computation