-
1
-
-
84976752387
-
Cryptographic Solution to a Problem of Access Control in a Hierarchy
-
S. G. Akl and P. D. Taylor, "Cryptographic Solution to a Problem of Access Control in a Hierarchy", ACM Transactions on Computer Systems, Vol. 1, No. 3, pp. 239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84956868427
-
Quick Group Key Distibution Scheme with Entity Revocation
-
Asiacrypt 1999
-
J. Anzai, N. Matsuzaki and T. Matsumoto, "Quick Group Key Distibution Scheme with Entity Revocation", Asiacrypt 1999, LNCS 1716, pp. 333-347, 1999.
-
(1999)
LNCS
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
3
-
-
84958760029
-
A Revocation Scheme with Minimal Storage at Receivers
-
ASIACRYPT 2002
-
T. Asano, "A Revocation Scheme with Minimal Storage at Receivers", ASIACRYPT 2002, LNCS 2501, pp.433-450.
-
LNCS
, vol.2501
, pp. 433-450
-
-
Asano, T.1
-
5
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
EUROCRYPT 1984
-
R. Blom, "An Optimal Class of Symmetric Key Generation Systems", EUROCRYPT 1984, LNCS 209, pp. 335-338.
-
LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
6
-
-
84955614214
-
Trade-offs between communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
-
CRYPTO'96
-
C. Blundo, L. F. Mattos, D. R. Stinson. "Trade-offs Between communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution",CRYPTO'96, LNCS 1109 pp. 387-400.
-
LNCS
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Mattos, L.F.2
Stinson, D.R.3
-
8
-
-
84894043862
-
Flexible Access Control with Master Keys
-
Crypto 1989
-
G. C. Chick and S. E. Tavares, "Flexible Access Control with Master Keys", Crypto 1989, LNCS 435, pp. 316-322, 1990.
-
(1990)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
9
-
-
84944242803
-
Unconditionally Secure Dynamic Conference Key Distribution
-
Y. Desmedt, V. Viswanathan, "Unconditionally Secure Dynamic Conference Key Distribution", IEEE, ISIT'98.
-
IEEE, ISIT'98
-
-
Desmedt, Y.1
Viswanathan, V.2
-
11
-
-
35248899841
-
Public Key Broadcast Encryption Secure against Adaptive Chosen Ciphertext Attack
-
PKC '03
-
Y. Dodis and N. Fazio, "Public Key Broadcast Encryption Secure against Adaptive Chosen Ciphertext Attack", PKC '03, LNCS 2567, 2003.
-
(2003)
LNCS
, vol.2567
-
-
Dodis, Y.1
Fazio, N.2
-
13
-
-
84979291225
-
Broadcast Encryption
-
CRYPTO 1993
-
A. Fiat, M. Naor, "Broadcast Encryption", CRYPTO 1993, LNCS 0773, pp. 480-491.
-
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
70349557354
-
Hierarchical ID-Based Cryptography
-
ASIACRYPT 2002
-
C. Gentry, A. Silverberg, "Hierarchical ID-Based Cryptography", ASIACRYPT 2002, LNCS 2501, pp.548-566.
-
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
15
-
-
84957067564
-
Efficient Methods for Integrating Traceability and Broadcast Encryption
-
CRYPTO 1999
-
E. Gafni, J. Staddon, Y.L. Yin, "Efficient Methods for Integrating Traceability and Broadcast Encryption", CRYPTO 1999, LNCS 1666, pp. 372-387.
-
LNCS
, vol.1666
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
16
-
-
84937435227
-
The LSD Broadcast Encryption Scheme
-
CRYPTO 2002
-
D. Halevi, A. Shamir "The LSD Broadcast Encryption Scheme",CRYPTO 2002, LNCS 2442, pp. 47-60.
-
LNCS
, vol.2442
, pp. 47-60
-
-
Halevi, D.1
Shamir, A.2
-
17
-
-
84957057937
-
Coding Constructions for Blacklisting Problems without Computational Assumptions
-
CRYPTO 1999
-
R. Kumar, S. Rajagopalan, A. Sahai, "Coding Constructions for Blacklisting Problems without Computational Assumptions", CRYPTO 1999, LNCS 1666, pp. 609-623.
-
LNCS
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
18
-
-
84947803330
-
Some Bounds and a Construction for Secure Broadcast Encryption
-
ASIACRYPT'98
-
K. Kurosawa, T. Yoshida, Y. Desmedt, M. Burmester, "Some Bounds and a Construction for Secure Broadcast Encryption", ASIACRYPT'98, LNCS 1514, pp. 420-433.
-
LNCS
, vol.1514
, pp. 420-433
-
-
Kurosawa, K.1
Yoshida, T.2
Desmedt, Y.3
Burmester, M.4
-
19
-
-
84957696450
-
Combinatorial Bounds for Broadcast Encryption
-
EUROCRYPT 1998
-
M. Luby, J. Staddon, "Combinatorial Bounds for Broadcast Encryption", EUROCRYPT 1998, LNCS 1403, pp. 512-526.
-
LNCS
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
20
-
-
84989455644
-
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
-
T. Matsumoto, H. Imai,"On the Key Predistribution System: A Practical Solution to the Key Distribution Problem", CRYPTO'87, 185-193.
-
CRYPTO'87
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
21
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
CRYPTO 2001
-
D. Naor, M. Naor and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers",CRYPTO 2001, LNCS 2139, 41-62.
-
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
22
-
-
84944319284
-
Effcient Trace and Revoke Schemes
-
Financial Cryptography FC 2000
-
M. Naor and B. Pinkas, "Effcient Trace and Revoke Schemes", Financial Cryptography FC 2000, LNCS1962, pp.1-20.
-
LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
23
-
-
0000028420
-
On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
-
D.R. Stinson, "On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption", Designs, Codes and Cryptography 12 (1997), 215-243.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
24
-
-
0003978251
-
-
IETF NetworkWorking Group, Request for Comments: 2627
-
D. Wallner, E. Harder and R. Agee, "Key Management for Multicast: Issues and Architectures", IETF NetworkWorking Group, Request for Comments: 2627, available from ftp://ftp.ietf.org/rfc/rfc2627.txt, 1999.
-
(1999)
Key Management for Multicast: Issues and Architectures
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
|