-
1
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer-Verlag
-
Naor, D., Naor, M., Lotspiech, J.B.: Revocation and tracing schemes for stateless receivers. In: CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag (2001) 41-62
-
(2001)
CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
2
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Yung, M., ed.: CRYPTO '02., Springer
-
Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In Yung, M., ed.: CRYPTO '02. Volume 2442 of Lecture Notes in Computer Science., Springer (2002) 47-60
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
3
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
Franklin, M.K., ed.: CRYPTO '04., Springer
-
Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In Franklin, M.K., ed.: CRYPTO '04. Volume 3152 of Lecture Notes in Computer Science., Springer (2004) 511-527
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
4
-
-
33746049082
-
One-way chain based broadcast encryption scheme
-
to appear
-
Jho, N.S., Hwang, J.Y., Cheon, J.H., Kim, M.H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption scheme. In: EUROCRYPT '05. (2005) to appear.
-
(2005)
EUROCRYPT '05
-
-
Jho, N.S.1
Hwang, J.Y.2
Cheon, J.H.3
Kim, M.H.4
Lee, D.H.5
Yoo, E.S.6
-
5
-
-
33746103184
-
On the economics of multicasting
-
Shavitt, Y., Winkler, P., Wool, A.: On the economics of multicasting. Netnomics 6(1) (2004) 1-20
-
(2004)
Netnomics
, vol.6
, Issue.1
, pp. 1-20
-
-
Shavitt, Y.1
Winkler, P.2
Wool, A.3
-
6
-
-
84979291225
-
Broadcast encryption
-
Fiat, A., Naor, M.: Broadcast encryption. In: CRYPTO '93. (1993) 480-491
-
(1993)
CRYPTO '93
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
7
-
-
35248901924
-
Public-key broadcast encryption for stateless receivers
-
Feigenbaum, J., ed.: ACM Workshop in Digital Rights Management - DRM 2002., Springer-Verlag
-
Dodis, Y., Fazio, N.: Public-key broadcast encryption for stateless receivers. In Feigenbaum, J., ed.: ACM Workshop in Digital Rights Management - DRM 2002. Volume 2696 of Lecture Notes in Computer Science., Springer-Verlag (2003) 61-80
-
(2003)
Lecture Notes in Computer Science
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
8
-
-
5644266059
-
Applications of multilinear forms to cryptography
-
Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. Contemporary Mathematics 324 (2003) 71-90
-
(2003)
Contemporary Mathematics
, vol.324
, pp. 71-90
-
-
Boneh, D.1
Silverberg, A.2
-
9
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Boneh, D., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. Cryptology ePrint Archive, Report 2005/018 (2005) http://eprint.iacr.org/.
-
(2005)
Cryptology ePrint Archive, Report
, vol.2005
, Issue.18
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
Luby, M., Staddon, J.: Combinatorial bounds for broadcast encryption. In: EUROCRYPT '98. (1998) 512-526
-
(1998)
EUROCRYPT '98
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
11
-
-
0029362450
-
Practical and provably secure release of a secret arid exchange of signatures
-
Damgård, I.B.: Practical and provably secure release of a secret arid exchange of signatures. Journal of Cryptology 8(4) (1995) 201-222
-
(1995)
Journal of Cryptology
, vol.8
, Issue.4
, pp. 201-222
-
-
Damgård, I.B.1
-
12
-
-
0018545449
-
How to share a secret. Commun
-
Shamir, A.: How to share a secret. Commun. ACM 22(11) (1979) 612-613
-
(1979)
ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|