http://7fa6xlti5joarlmkuhjaifa47ukgcwz6tfndgax45ocyn4rixm632jid.onion/anonbib/cache/jakobsson-optimally.html
(Update) Context of citations to this paper: More .... 15] standard zeroknowledge proofs in sorting networks [3, 13] use of multiple participants per layer [8, 18] error detecting techniques [14] ; and techniques based on secret sharing [10, 16] We explain the relations between these in Section 2. In most of these schemes, a... ...format. We propose to define this special format by adding a cryptographic checksum to the plaintext, drawing on the techniques of [JJ01] .