-
1
-
-
0034238689
-
Key Management for Restricted Multicast Using Broadcast Encryption
-
M. Abdalla, Y, Shavitt, and A. Wool. Key Management for Restricted Multicast Using Broadcast Encryption. In ACM Trans. on Networking, vol. 8, no. 4, pages 443-454. 2000
-
(2000)
ACM Trans. on Networking
, vol.8
, Issue.4
, pp. 443-454
-
-
Abdalla, M.1
Shavitt, Y.2
Wool, A.3
-
2
-
-
26444526864
-
Cryptographic Solution to a Multilevel Security Problem
-
Plenum Press
-
S.G. Akl and P.D. Taylor. Cryptographic Solution to a Multilevel Security Problem. In Proc. of Crypto 1982, pages 237-250. Plenum Press, 1982.
-
(1982)
Proc. of Crypto
, vol.1982
, pp. 237-250
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
84976752387
-
Cryptographic Solution to a Problem of Access Control in a Hierarchy
-
S.G. Akl and P.D. Taylor. Cryptographic Solution to a Problem of Access Control in a Hierarchy. In ACM Trans. on Camp. Sys., vol. 1, no. 3, pages 239-248. 1983.
-
(1983)
ACM Trans. on Camp. Sys.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
5
-
-
84958760029
-
A Revocation Scheme with Minimal Storage at Receivers
-
LNCS 2501, Springer-Verlag
-
T. Asano. A Revocation Scheme with Minimal Storage at Receivers. In Proc. of Asiacrypt 2002, LNCS 2501, pages 433-450. Springer-Verlag, 2002.
-
(2002)
Proc. of Asiacrypt 2002
, pp. 433-450
-
-
Asano, T.1
-
6
-
-
85012908743
-
One-Way Accumulators: A Decentralized Alternative to Digital Signatures
-
LNCS 765
-
J. Benaloh and M. de Mare. One-Way Accumulators: A Decentralized Alternative to Digital Signatures. In Proc. of Eurocrypt 1993, LNCS 765, pages 274-285.
-
Proc. of Eurocrypt 1993
, pp. 274-285
-
-
Benaloh, J.1
De Mare, M.2
-
7
-
-
85030481487
-
How to Broadcast a Secret
-
LNCS 547, Springer-Verlag
-
S. Berkovits. How to Broadcast a Secret. In Proc. of Eurocrypt 1991, LNCS 547, pages 535-541. Springer-Verlag, 1991.
-
(1991)
Proc. of Eurocrypt 1991
-
-
Berkovits, S.1
-
8
-
-
84957623200
-
Efficient Communication-Storage Tradeoffs for Multicast Encryption
-
R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. In Proc. of Eurocrypt 1999, pages 459-474.
-
(1999)
Proc. of Eurocrypt
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
9
-
-
84894043862
-
Flexible Access Control with Master Keys
-
LNCS 435, Springer-Verlag
-
G.C. Chick and S.E. Tavares. Flexible Access Control with Master Keys. In Proc. of Crypto 1989, LNCS 435, pages 316-322. Springer-Verlag, 1990.
-
(1990)
Proc. of Crypto 1989
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
10
-
-
84985922619
-
Tracing Traitors
-
LNCS 839, Springer-Verlag
-
B. Chor, A. Fiat and M. Naor. Tracing Traitors. In Proc. of Crypto 1994, LNCS 839, pages 257-270. Springer-Verlag, 1994.
-
(1994)
Proc. of Crypto 1994
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
12
-
-
84979291225
-
Broadcast Encryption
-
LNCS 773, Springer-Verlag
-
A. Fiat and M. Naor. Broadcast Encryption. In Proc. of Crypto 1993, LNCS 773, pages 480-491. Springer-Verlag, 1994.
-
(1994)
Proc. of Crypto 1993
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
13
-
-
84937435227
-
The LSD Broadcast Encryption Scheme
-
LNCS 2442, Springer-Verlag
-
D. Halevy and A. Shamir. The LSD Broadcast Encryption Scheme. In Proc. of Crypto 2002, LNCS 2442, pages 47-60. Springer-Verlag, 2002.
-
(2002)
Proc. of Crypto 2002
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
14
-
-
84957696450
-
Combinatorial Bounds for Broadcast Encryption
-
LNCS 1403, Springer-Verlag
-
M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. In Proc. of Eurocrypt 1998, LNCS 1403, pages 512-526. Springer-Verlag, 1998.
-
(1998)
Proc. of Eurocrypt 1998
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
15
-
-
0022115074
-
An Optimal Algorithm for Assigning Cryptographic Keys to Access Control in a Hierarchy
-
S.J. MacKinnon, P.D. Taylor, H. Meijer, and S.G. Akl. An Optimal Algorithm for Assigning Cryptographic Keys to Access Control in a Hierarchy. In IEEE Trans. on Comp., vol. C-34, no. 9, pages 797-802. 1985.
-
(1985)
IEEE Trans. on Comp.
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
16
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
LNCS 2139, Full version available as Electronic Colloquium on Computational Complexity Report
-
D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Proc. of Crypto 2001, LNCS 2139, pages 41-62. Full version available as Electronic Colloquium on Computational Complexity Report No. 43, 2002.
-
(2002)
Proc. of Crypto 2001
, Issue.43
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
17
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R.L. Rivest, A. Shamir and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. In Comm. of the ACM, 21. 1978.
-
(1978)
Comm. of the ACM
, vol.21
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|