메뉴 건너뛰기




Volumn 3935 LNCS, Issue , 2006, Pages 15-31

Property-based broadcast encryption for multi-level security policies

Author keywords

[No Author keywords available]

Indexed keywords

BROADCASTING; COMPUTER PRIVACY; DATA PRIVACY; MATHEMATICAL MODELS; SECURITY OF DATA; TREES (MATHEMATICS);

EID: 33745815600     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11734727_4     Document Type: Conference Paper
Times cited : (6)

References (17)
  • 1
    • 84858918037 scopus 로고    scopus 로고
    • Property-based broadcast encryption for multi-level security policies
    • Horst Görtz Institute for IT Security
    • Adelsbach, A., Huber, U., Sadeghi, A.R.: Property-based broadcast encryption for multi-level security policies. Technical Report, full version of this paper, Horst Görtz Institute for IT Security (2005) http://www.prosec.rub.de/publications.
    • (2005) Technical Report, Full Version of This Paper
    • Adelsbach, A.1    Huber, U.2    Sadeghi, A.R.3
  • 3
    • 64949151681 scopus 로고    scopus 로고
    • Digital watermarking
    • Becker, E., Buhse, W., Günnewig, D., Rump, N., eds.: Digital Rights Management: Technological, Economic, Legal and Political Aspects. Springer
    • Petitcolas, F.A.: Digital watermarking. In Becker, E., Buhse, W., Günnewig, D., Rump, N., eds.: Digital Rights Management: Technological, Economic, Legal and Political Aspects. Volume 2770 of Lecture Notes in Computer Science., Springer (2003) 81-92
    • (2003) Lecture Notes in Computer Science , vol.2770 , pp. 81-92
    • Petitcolas, F.A.1
  • 4
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE 92(6) (2004) 918-932
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 5
    • 84985922619 scopus 로고
    • Tracing traitors
    • Desmedt, Y., ed.: CRYPTO 1994. Springer
    • Chor, B., Fiat, A., Naor, M.: Tracing traitors. In Desmedt, Y., ed.: CRYPTO 1994. Volume 839 of Lecture Notes in Computer Science., Springer (1994) 257-270
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 6
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • Krawczyk, H., ed.: CRYPTO 1998. Springer
    • Naor, M., Pinkas, B.: Threshold traitor tracing. In Krawczyk, H., ed.: CRYPTO 1998. Volume 1462 of Lecture Notes in Computer Science., Springer (1998) 502-517
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 7
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R., ed.: CRYPTO 1993. Springer
    • Fiat, A., Naor, M.: Broadcast encryption. In Stinson, D.R., ed.: CRYPTO 1993. Volume 773 of Lecture Notes in Computer Science., Springer (1994) 480-491
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 8
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Kilian, J., ed.: CRYPTO 2001. Springer
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In Kilian, J., ed.: CRYPTO 2001. Volume 2139 of Lecture Notes in Computer Science., Springer (2001) 41-62
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 9
    • 0002380073 scopus 로고    scopus 로고
    • Tamper resistance - A cautionary note
    • Tygar, D., ed.: USENIX
    • Anderson, R.J., Kuhn, M.: Tamper resistance - a cautionary note. In Tygar, D., ed.: USENIX Electronic Commerce 1996, USENIX (1996) 1-11
    • (1996) USENIX Electronic Commerce 1996 , pp. 1-11
    • Anderson, R.J.1    Kuhn, M.2
  • 11
    • 29244478317 scopus 로고    scopus 로고
    • Support for multi-level security policies in DRM architectures
    • ACM Press
    • Popescu, B.C., Crispo, B., Tanenbaum, A.S.: Support for multi-level security policies in DRM architectures. In: NSPW 2004, ACM Press (2005) 3-9
    • (2005) NSPW 2004 , pp. 3-9
    • Popescu, B.C.1    Crispo, B.2    Tanenbaum, A.S.3
  • 12
    • 84941164630 scopus 로고    scopus 로고
    • High-bandwidth digital content protection system
    • Digital Content Protection, LLC: High-bandwidth digital content protection system. Specification Revision 1.1 (2003) URL http://www.digital-cp.com/home/HDCPSpecificationRev1_1.pdf.
    • (2003) Specification Revision 1.1
  • 13
    • 84941161503 scopus 로고    scopus 로고
    • Specification Revision 1.4 (2005)
    • Digital Transmission Licensing Administrator, LLC: Digital transmission content protection specification volume 1. Specification Revision 1.4 (2005) URL http://www.dtcp.com/data/info%2020050228%20dtcp%20vol%201%20%201p4.pdf.
    • Digital Transmission Content Protection Specification , vol.1
  • 14
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • Yung, M., ed.: CRYPTO 2002. Springer
    • Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In Yung, M., ed.: CRYPTO 2002. Volume 2442 of Lecture Notes in Computer Science., Springer (2002) 47-60
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 15
    • 85030481487 scopus 로고
    • How to broadcast a secret
    • Davies, D.W., ed.: EUROCRYPT 1991. Springer
    • Berkovits, S.: How to broadcast a secret. In Davies, D.W., ed.: EUROCRYPT 1991. Volume 547 of Lecture Notes in Computer Science., Springer (1991) 535-541
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 535-541
    • Berkovits, S.1
  • 16
    • 35248901924 scopus 로고    scopus 로고
    • Public key broadcast encryption for stateless receivers
    • Feigenbaum, J., ed.: Digital Rights Management Workshop. Springer
    • Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In Feigenbaum, J., ed.: Digital Rights Management Workshop. Volume 2696 of Lecture Notes in Computer Science., Springer (2003) 61-80
    • (2003) Lecture Notes in Computer Science , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 17
    • 24944542406 scopus 로고    scopus 로고
    • One-way chain based broadcast encryption schemes
    • Cramer, R., ed.: EUROCRYPT 2005. Springer
    • Jho, N.S., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In Cramer, R., ed.: EUROCRYPT 2005. Volume 3494 of Lecture Notes in Computer Science., Springer (2005) 559-574
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 559-574
    • Jho, N.S.1    Hwang, J.Y.2    Cheon, J.H.3    Kim, M.H.4    Lee, D.H.5    Yoo, E.S.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.