메뉴 건너뛰기




Volumn 3027, Issue , 2004, Pages 153-170

Optimal communication complexity of generic multicast key distribution

Author keywords

Key distribution; Lower bounds; Multicast

Indexed keywords

CRYPTOGRAPHY;

EID: 25444488186     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24676-3_10     Document Type: Article
Times cited : (27)

References (16)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 2
    • 84945118556 scopus 로고    scopus 로고
    • Lower bounds for multicast message authentication
    • B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May Springer-Verlag
    • D. Boneh, G. Durfee, and M. Franklin. Lower bounds for multicast message authentication. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 2045 of Lecture Notes in Computer Science, pages 437-452, Innsbruck, Austria, May 2001. Springer-Verlag.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 437-452
    • Boneh, D.1    Durfee, G.2    Franklin, M.3
  • 4
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May Springer-Verlag
    • R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1592 of Lecture Notes in Computer Science, Prague, Czech Republic, May 1999. Springer-Verlag.
    • (1999) Lecture Notes in Computer Science , vol.1592
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 6
    • 84979291225 scopus 로고
    • Broadcast encryption
    • D. R. Stinson, editor, Advances in Cryptology- CRYPTO '93, Proceedings of the 13th annual international Cryptology conference, Santa Barbara, California, USA, Aug. Springer-Verlag
    • A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson, editor, Advances in Cryptology- CRYPTO '93, Proceedings of the 13th annual international Cryptology conference, volume 773 of Lecture Notes in Computer Science, pages 480-491, Santa Barbara, California, USA, Aug. 1993. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 11
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial Bounds for Broadcast Encryption
    • K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May Springer-Verlag
    • M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1403 of Lecture Notes in Computer Science, pages 512-526, Espoo, Finland, May 1998. Springer-Verlag.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 12
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the abadi-rogaway logic of encrypted expressions
    • Preliminary version in WITS 2002
    • D. Micciancio and B. Warinschi. Completeness theorems for the abadi-rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004. Preliminary version in WITS 2002.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 13
    • 0034838199 scopus 로고    scopus 로고
    • ELK, A New Protocol for Efficient LargeGroup Key Distribution
    • Oakland, CA, USA, May IEEE
    • A. Perrig, D. X. Song, and J. D. Tygar. ELK, A New Protocol for Efficient LargeGroup Key Distribution. In IEEE Symposium on Security and Privacy, pages 247-262, Oakland, CA, USA, May 2001. IEEE.
    • (2001) IEEE Symposium on Security and Privacy , pp. 247-262
    • Perrig, A.1    Song, D.X.2    Tygar, J.D.3
  • 16
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb. Preliminary version in SIGCOMM 1998
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, Feb. 2000. Preliminary version in SIGCOMM 1998.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.