메뉴 건너뛰기




Volumn 92, Issue 6, 2004, Pages 910-917

Efficient state updates for key management

Author keywords

Broadcast encryption; Digital rights management (DRM); Revocation

Indexed keywords

ALGORITHMS; COMPUTATIONAL GEOMETRY; DIGITAL COMMUNICATION SYSTEMS; HIERARCHICAL SYSTEMS; INFORMATION MANAGEMENT; SERVERS;

EID: 18844424009     PISSN: 00189219     EISSN: None     Source Type: Journal    
DOI: 10.1109/JPROC.2004.827355     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 1
    • 84956868427 scopus 로고    scopus 로고
    • A quick group key distribution scheme with entity revocation
    • Heidelberg, Germany: Springer-Verlag
    • J. Anzai, N. Matsuzaki, and T. Matsumoto, "A quick group key distribution scheme with entity revocation," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1716, pp. 333-347.
    • (1999) Lecture Notes in Computer Science, Advances in Cryptology , vol.1716 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 2
    • 84957656774 scopus 로고    scopus 로고
    • MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences
    • B. Briscoe, "MARKS: zero side effect multicast key management using arbitrarily revealed key sequences," in Proc. 1st Int. Workshop Networked Group Communication (NGC'99), pp. 301-320.
    • Proc. 1st Int. Workshop Networked Group Communication (NGC'99) , pp. 301-320
    • Briscoe, B.1
  • 6
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. ACM, vol. 33, no. 4, pp. 792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 7
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • Heidelberg, Germany: Springer-Verlag
    • R. Kumar, S. Rajagopalan, and A. Sahai, "Coding constructions for blacklisting problems without computational assumptions," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, pp. 609-623.
    • (1999) Lecture Notes in Computer Science, Advances in Cryptology , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 8
    • 0003984462 scopus 로고    scopus 로고
    • Princeton, NJ: Princeton Univ. Press, Princeton Computer Science Notes
    • M. Luby, Pseudorandomness and Cryptographic Applications. Princeton, NJ: Princeton Univ. Press, 1996, Princeton Computer Science Notes.
    • (1996) Pseudorandomness and Cryptographic Applications
    • Luby, M.1
  • 9
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial bounds for broadcast encryption
    • Heidelberg, Germany: Springer-Verlag
    • M. Luby and J. Staddon, "Combinatorial bounds for broadcast encryption," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1998, vol. 1403, pp. 512-526.
    • (1998) Lecture Notes in Computer Science, Advances in Cryptology , vol.1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 10
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Heidelberg, Germany: Springer-Verlag
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2139, pp. 41-62.
    • (2001) Lecture Notes in Computer Science, Advances in Cryptology , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 11
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large groups using one-way function trees
    • May
    • D. McGrew and A. T. Sherman, "Key establishment in large groups using one-way function trees," IEEE Trans. Software Eng., vol. 29, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Software Eng. , vol.29 , pp. 444-458
    • McGrew, D.1    Sherman, A.T.2
  • 16
    • 0003259063 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architecture
    • Network Working Group, June
    • D. M. Wallner, E. Harder, and R. C. Agee, "Key management for multicast: Issues and architecture," Network Working Group, RFC 2627, June 1999.
    • (1999) RFC , vol.2627
    • Wallner, D.M.1    Harder, E.2    Agee, R.C.3
  • 17
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. SIGCOMM '98, pp. 68-79.
    • Proc. SIGCOMM '98 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 18
    • 84975035144 scopus 로고    scopus 로고
    • Key management for encrypted broadcast
    • A. Wool, "Key management for encrypted broadcast," ACM Trans. Inf. Syst. Security, vol. 3, no. 2, pp. 107-134, 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.2 , pp. 107-134
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.