메뉴 건너뛰기




Volumn , Issue , 1994, Pages 81-88

On key distribution via true broadcasting

Author keywords

Broadcast encryption; Key distribution; Secret sharing

Indexed keywords

BROADCASTING; INFORMATION THEORY; NETWORK SECURITY;

EID: 0343017090     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/191177.191195     Document Type: Conference Paper
Times cited : (29)

References (19)
  • 2
    • 84920422930 scopus 로고
    • One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist
    • IEEE Computer Society Press
    • Blakley, G., "One-time pads are Key Safeguarding Schemes, not Cryptosystems: Fast Key Safeguarding Schemes (Threshold Schemes) Exist", Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1980, pp. 108-113.
    • (1980) Proceedings of IEEE Symposium on Security and Privacy , pp. 108-113
    • Blakley, G.1
  • 7
    • 0343452731 scopus 로고
    • A secure broadcasting scheme based on discrete logarithms
    • Chang, C. C., Hwang, S. J., "A Secure Broadcasting Scheme Based on Discrete Logarithms", Control and Computers, Vol. 20, No. 2, 1992, pp. 49-53.
    • (1992) Control and Computers , vol.20 , Issue.2 , pp. 49-53
    • Chang, C.C.1    Hwang, S.J.2
  • 8
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • August
    • Chiou, G. H., Chen, W. T., "Secure Broadcasting Using the Secure Lock", IEEE Transactions on Software Engineering, Vol. 15, No. 8, August 1989, pp. 929-934.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.H.1    Chen, W.T.2
  • 10
    • 5244317013 scopus 로고
    • A store-and-forward architecture for video-on-demand service
    • Banff, Alberta, Aug.13-16
    • Fortier, M., "A Store-and-Forward Architecture for Video-on-Demand Service", presented at Multimedia Communications'93, Banff, Alberta, Aug.13-16, 1993, pp. 262-268.
    • (1993) Multimedia Communications'93 , pp. 262-268
    • Fortier, M.1
  • 12
    • 0021496883 scopus 로고
    • Point-to-multipoint communication over broadcast links
    • Gopal, J., Jaffe, M., "Point-to-multipoint Communication over Broadcast Links", IEEE Transactions on Communications, COM-32(9), 1982, pp. 1034-1044.
    • (1982) IEEE Transactions on Communications , vol.COM-32 , Issue.9 , pp. 1034-1044
    • Gopal, J.1    Jaffe, M.2
  • 15
    • 0024718179 scopus 로고
    • A new threshold scheme and its applications in designing the conference key distribution cryptosystem
    • Laih, C., Lee, J., Harn, L., "A New Threshold Scheme and its Applications in Designing the Conference Key Distribution Cryptosystem", Information Processing Letters, Vol. 32, 1989, pp. 95-99.
    • (1989) Information Processing Letters , vol.32 , pp. 95-99
    • Laih, C.1    Lee, J.2    Harn, L.3
  • 16
    • 0012767905 scopus 로고
    • A conference key broadcasting system using sealed locks
    • Lin, C. H., Chang, C. C., Lee, R. C., "A Conference Key Broadcasting System Using Sealed Locks", Information Systems, Vol. 17, No. 4, 1992, pp. 323-328.
    • (1992) Information Systems , vol.17 , Issue.4 , pp. 323-328
    • Lin, C.H.1    Chang, C.C.2    Lee, R.C.3
  • 17
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • Shamir, A., "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, November 1979, pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 18
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C., "Communication Theory of Secrecy Systems", Bell System Technical Journal, Vol. 28, 1949, pp. 656-715.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1
  • 19
    • 0003038453 scopus 로고
    • An introduction to shared secret and/or shared control schemes and their application
    • IEEE Press
    • Simmons, G., "An Introduction to Shared Secret and/or Shared Control Schemes and their Application", Contemporary Cryptology, IEEE Press, 1991, pp. 441-497.
    • (1991) Contemporary Cryptology , pp. 441-497
    • Simmons, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.