메뉴 건너뛰기




Volumn 2894, Issue , 2003, Pages 374-391

Sequential key derivation patterns for broadcast encryption and key predistribution schemes

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 0344196671     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-40061-5_24     Document Type: Article
Times cited : (27)

References (25)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic Solution to a Problem of Access Control in a Hierarchy
    • S. G. Akl and P. D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy", ACM Transactions on Computer Systems, Vol. 1, No. 3, pp. 239-248, 1983.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 2
    • 84956868427 scopus 로고    scopus 로고
    • Quick Group Key Distibution Scheme with Entity Revocation
    • Asiacrypt 1999
    • J. Anzai, N. Matsuzaki and T. Matsumoto, "Quick Group Key Distibution Scheme with Entity Revocation", Asiacrypt 1999, LNCS 1716, pp. 333-347, 1999.
    • (1999) LNCS , vol.1716 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 3
    • 84958760029 scopus 로고    scopus 로고
    • A Revocation Scheme with Minimal Storage at Receivers
    • ASIACRYPT 2002
    • T. Asano, "A Revocation Scheme with Minimal Storage at Receivers", ASIACRYPT 2002, LNCS 2501, pp.433-450.
    • LNCS , vol.2501 , pp. 433-450
    • Asano, T.1
  • 5
    • 84884730529 scopus 로고    scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • EUROCRYPT 1984
    • R. Blom, "An Optimal Class of Symmetric Key Generation Systems", EUROCRYPT 1984, LNCS 209, pp. 335-338.
    • LNCS , vol.209 , pp. 335-338
    • Blom, R.1
  • 6
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
    • CRYPTO'96
    • C. Blundo, L. F. Mattos, D. R. Stinson. "Trade-offs Between communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution",CRYPTO'96, LNCS 1109 pp. 387-400.
    • LNCS , vol.1109 , pp. 387-400
    • Blundo, C.1    Mattos, L.F.2    Stinson, D.R.3
  • 8
    • 84894043862 scopus 로고
    • Flexible Access Control with Master Keys
    • Crypto 1989
    • G. C. Chick and S. E. Tavares, "Flexible Access Control with Master Keys", Crypto 1989, LNCS 435, pp. 316-322, 1990.
    • (1990) LNCS , vol.435 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 9
    • 84944242803 scopus 로고    scopus 로고
    • Unconditionally Secure Dynamic Conference Key Distribution
    • Y. Desmedt, V. Viswanathan, "Unconditionally Secure Dynamic Conference Key Distribution", IEEE, ISIT'98.
    • IEEE, ISIT'98
    • Desmedt, Y.1    Viswanathan, V.2
  • 11
    • 35248899841 scopus 로고    scopus 로고
    • Public Key Broadcast Encryption Secure against Adaptive Chosen Ciphertext Attack
    • PKC '03
    • Y. Dodis and N. Fazio, "Public Key Broadcast Encryption Secure against Adaptive Chosen Ciphertext Attack", PKC '03, LNCS 2567, 2003.
    • (2003) LNCS , vol.2567
    • Dodis, Y.1    Fazio, N.2
  • 13
    • 84979291225 scopus 로고    scopus 로고
    • Broadcast Encryption
    • CRYPTO 1993
    • A. Fiat, M. Naor, "Broadcast Encryption", CRYPTO 1993, LNCS 0773, pp. 480-491.
    • LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 14
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • ASIACRYPT 2002
    • C. Gentry, A. Silverberg, "Hierarchical ID-Based Cryptography", ASIACRYPT 2002, LNCS 2501, pp.548-566.
    • LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 15
    • 84957067564 scopus 로고    scopus 로고
    • Efficient Methods for Integrating Traceability and Broadcast Encryption
    • CRYPTO 1999
    • E. Gafni, J. Staddon, Y.L. Yin, "Efficient Methods for Integrating Traceability and Broadcast Encryption", CRYPTO 1999, LNCS 1666, pp. 372-387.
    • LNCS , vol.1666 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 16
    • 84937435227 scopus 로고    scopus 로고
    • The LSD Broadcast Encryption Scheme
    • CRYPTO 2002
    • D. Halevi, A. Shamir "The LSD Broadcast Encryption Scheme",CRYPTO 2002, LNCS 2442, pp. 47-60.
    • LNCS , vol.2442 , pp. 47-60
    • Halevi, D.1    Shamir, A.2
  • 17
    • 84957057937 scopus 로고    scopus 로고
    • Coding Constructions for Blacklisting Problems without Computational Assumptions
    • CRYPTO 1999
    • R. Kumar, S. Rajagopalan, A. Sahai, "Coding Constructions for Blacklisting Problems without Computational Assumptions", CRYPTO 1999, LNCS 1666, pp. 609-623.
    • LNCS , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 18
    • 84947803330 scopus 로고    scopus 로고
    • Some Bounds and a Construction for Secure Broadcast Encryption
    • ASIACRYPT'98
    • K. Kurosawa, T. Yoshida, Y. Desmedt, M. Burmester, "Some Bounds and a Construction for Secure Broadcast Encryption", ASIACRYPT'98, LNCS 1514, pp. 420-433.
    • LNCS , vol.1514 , pp. 420-433
    • Kurosawa, K.1    Yoshida, T.2    Desmedt, Y.3    Burmester, M.4
  • 19
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial Bounds for Broadcast Encryption
    • EUROCRYPT 1998
    • M. Luby, J. Staddon, "Combinatorial Bounds for Broadcast Encryption", EUROCRYPT 1998, LNCS 1403, pp. 512-526.
    • LNCS , vol.1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 20
    • 84989455644 scopus 로고    scopus 로고
    • On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
    • T. Matsumoto, H. Imai,"On the Key Predistribution System: A Practical Solution to the Key Distribution Problem", CRYPTO'87, 185-193.
    • CRYPTO'87 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 21
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • CRYPTO 2001
    • D. Naor, M. Naor and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers",CRYPTO 2001, LNCS 2139, 41-62.
    • LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 22
    • 84944319284 scopus 로고    scopus 로고
    • Effcient Trace and Revoke Schemes
    • Financial Cryptography FC 2000
    • M. Naor and B. Pinkas, "Effcient Trace and Revoke Schemes", Financial Cryptography FC 2000, LNCS1962, pp.1-20.
    • LNCS , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 23
    • 0000028420 scopus 로고    scopus 로고
    • On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
    • D.R. Stinson, "On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption", Designs, Codes and Cryptography 12 (1997), 215-243.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 25
    • 0012943336 scopus 로고    scopus 로고
    • Secure Group Communications Using Key Graphs
    • C. K. Wong, M. Gouda and S. S. Lam, "Secure Group Communications Using Key Graphs", ACM SIGCOMM'98, 1998.
    • (1998) ACM SIGCOMM'98
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.