메뉴 건너뛰기




Volumn 12, Issue 3, 1997, Pages 215-243

On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption

Author keywords

Broadcast encryption; Combinatorial designs; Key distribution; Resilient functions; Secret sharing schemes

Indexed keywords


EID: 0000028420     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1008268610932     Document Type: Article
Times cited : (129)

References (40)
  • 3
    • 0005944705 scopus 로고
    • Interaction in key distribution schemes
    • Advances in Cryptology: CRYPTO '93
    • A. Beimel and B. Chor, Interaction in key distribution schemes, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 444-455.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 444-455
    • Beimel, A.1    Chor, B.2
  • 6
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. Bennett, G. Brassard and J.-M. Robert, Privacy amplification by public discussion, SIAM J. Comput., Vol. 17 (1988) pp. 210-229.
    • (1988) SIAM J. Comput. , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 7
    • 85030481487 scopus 로고
    • How to broadcast a secret
    • Advances in Cryptology: EUROCRYPT '91
    • S. Berkovits, How to broadcast a secret, Advances in Cryptology: EUROCRYPT '91, Lecture Notes in Computer Science, 547 (1992) pp. 536-541.
    • (1992) Lecture Notes in Computer Science , vol.547 , pp. 536-541
    • Berkovits, S.1
  • 9
    • 84996557101 scopus 로고
    • Bounds for resilient functions and orthogonal arrays
    • Advances in Cryptology: EUROCRYPT '91
    • J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Bounds for resilient functions and orthogonal arrays, Advances in Cryptology: CRYPTO '94, Lecture Notes in Computer Science, 839 (1994) pp. 247-256.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 247-256
    • Bierbrauer, J.1    Gopalakrishnan, K.2    Stinson, D.R.3
  • 10
    • 0030365320 scopus 로고    scopus 로고
    • Orthogonal arrays, resilient functions, error-correcting codes and linear programming bounds
    • J. Bierbrauer, K. Gopalakrishnan and D. R. Stinson, Orthogonal arrays, resilient functions, error-correcting codes and linear programming bounds, SIAM J. Discrete Math, Vol. 9 (1996) pp. 424-452.
    • (1996) SIAM J. Discrete Math , vol.9 , pp. 424-452
    • Bierbrauer, J.1    Gopalakrishnan, K.2    Stinson, D.R.3
  • 11
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Advances in Cryptology: EUROCRYPT '84
    • R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: EUROCRYPT '84, Lecture Notes in Computer Science, 209 (1985) pp. 335-338.
    • (1985) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • Blom, R.1
  • 12
    • 84948984838 scopus 로고
    • Space requirements for broadcast encryption
    • Advances in Cryptology: EUROCRYPT '94
    • C. Blundo and A. Cresti, Space requirements for broadcast encryption, Advances in Cryptology: EUROCRYPT '94, Lecture Notes in Computer Science, 950 (1995) pp. 287-298.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 287-298
    • Blundo, C.1    Cresti, A.2
  • 14
    • 85027395928 scopus 로고
    • Randomness in distribution protocols
    • Automata, Languages and Programming: ICALP '94
    • C. Blundo, A. De Santis and U. Vaccaro, Randomness in distribution protocols, Automata, Languages and Programming: ICALP '94, Lecture Notes in Computer Science, 820 (1994) pp. 568-579.
    • (1994) Lecture Notes in Computer Science , vol.820 , pp. 568-579
    • Blundo, C.1    De Santis, A.2    Vaccaro, U.3
  • 15
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
    • Advances in Cryptology: CRYPTO '96
    • C. Blundo, L. A. Frota Mattos and D. R. Stinson, Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution, Advances in Cryptology: CRYPTO '96, Lecture Notes in Computer Science, 1109 (1996) pp. 387-400.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 387-400
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 16
    • 0028678378 scopus 로고
    • Multiple key distribution maintaining user anonymity via broadcast channels
    • C. Blundo, L. A. Frota Mattos and D. R. Stinson, Multiple key distribution maintaining user anonymity via broadcast channels, J. Computer Security, Vol. 3 (1994/95) pp. 309-323.
    • (1994) J. Computer Security , vol.3 , pp. 309-323
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 18
    • 0000849681 scopus 로고
    • On the classification of ideal secret sharing schemes
    • E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, Journal of Cryptology, Vol. 4 (1991) pp. 123-134.
    • (1991) Journal of Cryptology , vol.4 , pp. 123-134
    • Brickell, E.F.1    Davenport, D.M.2
  • 22
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Advances in Cryptology: CRYPTO '93
    • A. Fiat and M. Naor, Broadcast encryption, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 480-491.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 23
    • 0002302934 scopus 로고
    • On the size of separating systems and families of perfect hash functions
    • M. L. Fredman and J. Komlos, On the size of separating systems and families of perfect hash functions, SIAM Journal of Algebraic and Discrete Methods, Vol. 5 (1984) pp. 61-68.
    • (1984) SIAM Journal of Algebraic and Discrete Methods , vol.5 , pp. 61-68
    • Fredman, M.L.1    Komlos, J.2
  • 25
    • 0025212474 scopus 로고
    • A matrix key-distribution scheme
    • L. Gong and D. L. Wheeler, A matrix key-distribution scheme, Journal of Cryptology, Vol. 2 (1990) pp. 51-59.
    • (1990) Journal of Cryptology , vol.2 , pp. 51-59
    • Gong, L.1    Wheeler, D.L.2
  • 27
    • 0005275186 scopus 로고
    • Three characterizations of non-binary correlation-immune and resilient functions
    • K. Gopalakrishnan and D. R. Stinson, Three characterizations of non-binary correlation-immune and resilient functions, Designs, Codes and Cryptography, Vol. 5 (1995) pp. 241-251.
    • (1995) Designs, Codes and Cryptography , vol.5 , pp. 241-251
    • Gopalakrishnan, K.1    Stinson, D.R.2
  • 30
    • 84955574846 scopus 로고
    • Security of the center in key distribution schemes
    • Advances in Cryptology: ASIACRYPT '94
    • K. Kurosawa, K. Okada and K. Sakano, Security of the center in key distribution schemes, Advances in Cryptology: ASIACRYPT '94, Lecture Notes in Computer Science, 917 (1995).
    • (1995) Lecture Notes in Computer Science , vol.917
    • Kurosawa, K.1    Okada, K.2    Sakano, K.3
  • 31
    • 84949023663 scopus 로고
    • Secret-key agreement without public-key cryptography
    • Advances in Cryptology: CRYPTO '93
    • T. Leighton and S. Micali, Secret-key agreement without public-key cryptography, Advances in Cryptology: CRYPTO '93, Lecture Notes in Computer Science, 773 (1994) pp. 456-479.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 32
    • 0002874527 scopus 로고
    • Incidence structures for key sharing
    • Advances in Cryptology: ASIACRYPT '94
    • T. Matsumoto, Incidence structures for key sharing, Advances in Cryptology: ASIACRYPT '94, Lecture Notes in Computer Science, 917 (1995) pp. 342-353.
    • (1995) Lecture Notes in Computer Science , vol.917 , pp. 342-353
    • Matsumoto, T.1
  • 35
    • 1842808765 scopus 로고
    • Applications of finite geometries to information security
    • C. M. O'Keefe, Applications of finite geometries to information security, Australasian J. Combinatorics, Vol. 7 (1993) pp. 195-212.
    • (1993) Australasian J. Combinatorics , vol.7 , pp. 195-212
    • O'Keefe, C.M.1
  • 36
    • 0002724154 scopus 로고
    • Some constructions for key distribution patterns
    • K. A. S. Quinn, Some constructions for key distribution patterns, Designs, Codes and Cryptography, Vol. 4 (1994) pp. 177-191.
    • (1994) Designs, Codes and Cryptography , vol.4 , pp. 177-191
    • Quinn, K.A.S.1
  • 37
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Communications of the ACM, Vol. 22 (1979) pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 38
    • 0000708528 scopus 로고
    • An explication of secret sharing schemes
    • D. R. Stinson, An explication of secret sharing schemes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 357-390.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 357-390
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.