http://7fa6xlti73nrpxl6cykao4wp7g3bg4624ghrtdomlvkeivvwclv2iyad.onion/anonbib/cache/jakobsson-optimally.html
(Update) Context of citations to this paper: More .... 15] standard zeroknowledge proofs in sorting networks [3, 13] use of multiple participants per layer [8, 18] error detecting techniques [14] ; and techniques based on secret sharing [10, 16] We explain the relations between these in Section 2. In most of these schemes, a... ...format. We propose to define this special format by adding a cryptographic checksum to the plaintext, drawing on the techniques of [JJ01] .