메뉴 건너뛰기




Volumn 2576, Issue , 2003, Pages 146-163

A group key distribution scheme with decentralised user join

Author keywords

Group key distribution schemes; Key distribution schemes; Secure multicast; Traceability; User join; User revocation

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35248812423     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36413-7_11     Document Type: Article
Times cited : (15)

References (31)
  • 1
    • 84956868427 scopus 로고    scopus 로고
    • A Quick Group Key Distribution Scheme with "Entity Revocation"
    • Advances in Cryptology - ASIACRYPT '99
    • J. Anzai, N. Matsuzaki and T. Matsumoto. A Quick Group Key Distribution Scheme with "Entity Revocation". Advances in Cryptology - ASIACRYPT '99, Lecture Notes in Computer Science 1716, pages 333-347, 1999.
    • (1999) Lecture Notes in Computer Science 1716 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 2
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • Advances in Cryptology - EUROCRYPT '84
    • R. Blom. An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology - EUROCRYPT '84, Lecture Notes in Computer Science 209, pages 335-338, 1985.
    • (1985) Lecture Notes in Computer Science 209 , pp. 335-338
    • Blom, R.1
  • 3
    • 84948984838 scopus 로고
    • Space Requirements for Broadcast Encryption
    • Advances in Cryptology - EUROCRYPT '94
    • C. Blundo and A. Cresti. Space Requirements for Broadcast Encryption. Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science 950, pages 287-298, 1994.
    • (1994) Lecture Notes in Computer Science 950 , pp. 287-298
    • Blundo, C.1    Cresti, A.2
  • 4
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between Communication and Storage in Unconditionally Secure Systems for Broadcast Encryption and Interactive Key Distribution
    • Advances in Cryptology - CRYPTO '96
    • C. Blundo, L. A. Frota Mattos and D. Stinson. Trade-offs Between Communication and Storage in Unconditionally Secure Systems for Broadcast Encryption and Interactive Key Distribution. Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science 1109, pages 387-400, 1996.
    • (1996) Lecture Notes in Computer Science 1109 , pp. 387-400
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.3
  • 6
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman Problem
    • Third Algorithmic Number Theory Symposium
    • D. Boneh. The Decision Diffie-Hellman Problem. Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science 1423, pages 48-63, 1998.
    • (1998) Lecture Notes in Computer Science 1423 , pp. 48-63
    • Boneh, D.1
  • 7
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public Key Traitor Tracing Scheme
    • Advances in Cryptology - CRYPTO '99
    • D. Boneh and M. Franklin. An Efficient Public Key Traitor Tracing Scheme. Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science 1666, pages 338-353, 1999.
    • (1999) Lecture Notes in Computer Science 1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84957623200 scopus 로고    scopus 로고
    • Efficient Communication-Storage Tradeoffs for Multicast Encryption
    • Advances in Cryptology - EUROCRYPT '99
    • R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science 1592, pages 459-474, 1999.
    • (1999) Lecture Notes in Computer Science 1592 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 11
  • 13
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Advances in Cryptology - CRYPTO '93
    • A. Fiat and M. Naor. Broadcast Encryption. Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science 773, pages 480-491, 1994.
    • (1994) Lecture Notes in Computer Science 773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 14
    • 84957626176 scopus 로고
    • Proactive Secret Sharing Or: How to Cope with Perpetual Leakage
    • Advances in Cryptology - CRYPTO '95
    • A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Advances in Cryptology - CRYPTO '95, Lecture Notes in Computer Science 963, pages 339-352, 1995.
    • (1995) Lecture Notes in Computer Science 963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 15
    • 0034449805 scopus 로고    scopus 로고
    • Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups
    • Y. Kim, A. Perrig and G. Tsudik. Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups. Proceedings of CCS '00, pages 235-244, 2000.
    • (2000) Proceedings of CCS '00 , pp. 235-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 16
    • 84957057937 scopus 로고    scopus 로고
    • Coding Constructions for Blacklisting Problems Without Computational Assumptions
    • Advances in Cryptology - CRYPTO '99
    • R. Kumar, S. Rajagopalan and A. Sahai. Coding Constructions for Blacklisting Problems Without Computational Assumptions. Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science 1666, pages 609-623, 1999.
    • (1999) Lecture Notes in Computer Science 1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 17
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial Bounds for Broadcast Encryption
    • Advances in Cryptology - EUROCRYPT '98
    • M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science 1403, pages 512-526, 1998.
    • (1998) Lecture Notes in Computer Science 1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 19
    • 84989455644 scopus 로고
    • On a Key Predistribution System - A Practical Solution to the Key Distribution Problem
    • Advances in Cryptology - CRYPTO '87
    • T. Matsumoto and H. Imai. On a Key Predistribution System - A Practical Solution to the Key Distribution Problem. Advances in Cryptology - CRYPTO '87, Lecture Notes in Computer Science 293, pages 185-193, 1988.
    • (1988) Lecture Notes in Computer Science 293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 22
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science 2139, pages 41-62, 2001.
    • (2001) Lecture Notes in Computer Science 2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 23
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Financial Cryptography 2000
    • M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. Financial Cryptography 2000, Lecture Notes in Computer Science 1962, pages 1-20, 2001.
    • (2001) Lecture Notes in Computer Science 1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 24
    • 84957617696 scopus 로고    scopus 로고
    • Threshold Traitor Tracing
    • Advances in Cryptology - CRYPTO '98
    • M. Naor and B. Pinkas. Threshold Traitor Tracing. Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science 1462, pages 502-517, 1998.
    • (1998) Lecture Notes in Computer Science 1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 26
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Communications of the ACM 22, pages 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 28
    • 0000028420 scopus 로고    scopus 로고
    • On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
    • D. R. Stinson. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption. Designs, Codes and Cryptography 12, pages 215-243, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 29
    • 0005053804 scopus 로고    scopus 로고
    • Some New Results on Key Distribution Patterns and Broadcast Encryption
    • D. R. Stinson and T. van Trung. Some New Results on Key Distribution Patterns and Broadcast Encryption. Designs, Codes and Cryptography 15, pages 261-279, 1998.
    • (1998) Designs, Codes and Cryptography , vol.15 , pp. 261-279
    • Stinson, D.R.1    Van Trung, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.