메뉴 건너뛰기




Volumn 51, Issue 2, 2005, Pages 264-266

An ID-based broadcast encryption scheme for key distribution

Author keywords

Bilinear pairing; Broadcast encryption; Key distribution

Indexed keywords

ALGORITHMS; BROADCASTING; FEATURE EXTRACTION; HEURISTIC METHODS; POLYNOMIALS; SECURITY OF DATA; SET THEORY;

EID: 20444502239     PISSN: 00189316     EISSN: None     Source Type: Journal    
DOI: 10.1109/TBC.2005.847600     Document Type: Article
Times cited : (108)

References (9)
  • 2
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Lecture Notes in Computer Science
    • A. Fiat and M. Naor, "Broadcast encryption," in Proc. of Crypto'93, vol. 773, Lecture Notes in Computer Science, 1994, pp. 480-491.
    • (1994) Proc. of Crypto'93 , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 4
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • D. R. Stinson, "On some methods for unconditionally secure key distribution and broadcast encryption," in Designs, Codes and Cryptography, 1997, vol. 12, pp. 215-243.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 5
    • 84944050090 scopus 로고    scopus 로고
    • Applications of multiple trust authorities in pairing based cryptosystems
    • L. Chen, K. Hamsion, N. P. Smart, and D. Soldera, "Applications of multiple trust authorities in pairing based cryptosystems," in InfraSec 2002, 2002, pp. 260-275.
    • (2002) InfraSec 2002 , pp. 260-275
    • Chen, L.1    Hamsion, K.2    Smart, N.P.3    Soldera, D.4
  • 7
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," in In Advances in Cryptology-CRYPTO'99, 1999, pp. 537-554.
    • (1999) In Advances in Cryptology-CRYPTO'99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 9
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature scheme
    • A. Shamir, "Identity-based cryptosystems and signature scheme," in Proc. of Crypto'84, 1984, pp. 47-53.
    • (1984) Proc. of Crypto'84 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.