-
1
-
-
84956868427
-
A Quick Group Key Distribution Scheme with "Entity Revocation"
-
Advances in Cryptology - ASIACRYPT '99
-
J. Anzai, N. Matsuzaki and T. Matsumoto. A Quick Group Key Distribution Scheme with "Entity Revocation". Advances in Cryptology - ASIACRYPT '99, Lecture Notes in Computer Science 1716, pages 333-347, 1999.
-
(1999)
Lecture Notes in Computer Science 1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
2
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
Advances in Cryptology - EUROCRYPT '84
-
R. Blom. An Optimal Class of Symmetric Key Generation Systems. Advances in Cryptology - EUROCRYPT '84, Lecture Notes in Computer Science 209, pages 335-338, 1985.
-
(1985)
Lecture Notes in Computer Science 209
, pp. 335-338
-
-
Blom, R.1
-
3
-
-
84948984838
-
Space Requirements for Broadcast Encryption
-
Advances in Cryptology - EUROCRYPT '94
-
C. Blundo and A. Cresti. Space Requirements for Broadcast Encryption. Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science 950, pages 287-298, 1994.
-
(1994)
Lecture Notes in Computer Science 950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
4
-
-
84955614214
-
Trade-offs between Communication and Storage in Unconditionally Secure Systems for Broadcast Encryption and Interactive Key Distribution
-
Advances in Cryptology - CRYPTO '96
-
C. Blundo, L. A. Frota Mattos and D. Stinson. Trade-offs Between Communication and Storage in Unconditionally Secure Systems for Broadcast Encryption and Interactive Key Distribution. Advances in Cryptology - CRYPTO '96, Lecture Notes in Computer Science 1109, pages 387-400, 1996.
-
(1996)
Lecture Notes in Computer Science 1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.3
-
5
-
-
85028765277
-
Perfectly Secure Key Distribution for Dynamic Conferences
-
Advances in Cryptology - CRYPTO'92
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung. Perfectly Secure Key Distribution for Dynamic Conferences. Advances in Cryptology - CRYPTO'92, Lecture Notes in Computer Science 740, pages 471-486, 1993.
-
(1993)
Lecture Notes in Computer Science 740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Third Algorithmic Number Theory Symposium
-
D. Boneh. The Decision Diffie-Hellman Problem. Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science 1423, pages 48-63, 1998.
-
(1998)
Lecture Notes in Computer Science 1423
, pp. 48-63
-
-
Boneh, D.1
-
7
-
-
84957085257
-
An Efficient Public Key Traitor Tracing Scheme
-
Advances in Cryptology - CRYPTO '99
-
D. Boneh and M. Franklin. An Efficient Public Key Traitor Tracing Scheme. Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science 1666, pages 338-353, 1999.
-
(1999)
Lecture Notes in Computer Science 1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0032661699
-
Issues in Multicast Security: A Taxonomy and Efficient Constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas. Issues in Multicast Security: A Taxonomy and Efficient Constructions. Proceedings of INFOCOM '99, pages 708-716, 1999.
-
(1999)
Proceedings of INFOCOM '99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
9
-
-
84957623200
-
Efficient Communication-Storage Tradeoffs for Multicast Encryption
-
Advances in Cryptology - EUROCRYPT '99
-
R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. Advances in Cryptology - EUROCRYPT '99, Lecture Notes in Computer Science 1592, pages 459-474, 1999.
-
(1999)
Lecture Notes in Computer Science 1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
13
-
-
84979291225
-
Broadcast Encryption
-
Advances in Cryptology - CRYPTO '93
-
A. Fiat and M. Naor. Broadcast Encryption. Advances in Cryptology - CRYPTO '93, Lecture Notes in Computer Science 773, pages 480-491, 1994.
-
(1994)
Lecture Notes in Computer Science 773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
84957626176
-
Proactive Secret Sharing Or: How to Cope with Perpetual Leakage
-
Advances in Cryptology - CRYPTO '95
-
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Advances in Cryptology - CRYPTO '95, Lecture Notes in Computer Science 963, pages 339-352, 1995.
-
(1995)
Lecture Notes in Computer Science 963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
15
-
-
0034449805
-
Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups
-
Y. Kim, A. Perrig and G. Tsudik. Simple and Fault-Tolerance Key Agreement for Dynamic Collaborative Groups. Proceedings of CCS '00, pages 235-244, 2000.
-
(2000)
Proceedings of CCS '00
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
16
-
-
84957057937
-
Coding Constructions for Blacklisting Problems Without Computational Assumptions
-
Advances in Cryptology - CRYPTO '99
-
R. Kumar, S. Rajagopalan and A. Sahai. Coding Constructions for Blacklisting Problems Without Computational Assumptions. Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer Science 1666, pages 609-623, 1999.
-
(1999)
Lecture Notes in Computer Science 1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
17
-
-
84957696450
-
Combinatorial Bounds for Broadcast Encryption
-
Advances in Cryptology - EUROCRYPT '98
-
M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. Advances in Cryptology - EUROCRYPT '98, Lecture Notes in Computer Science 1403, pages 512-526, 1998.
-
(1998)
Lecture Notes in Computer Science 1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
19
-
-
84989455644
-
On a Key Predistribution System - A Practical Solution to the Key Distribution Problem
-
Advances in Cryptology - CRYPTO '87
-
T. Matsumoto and H. Imai. On a Key Predistribution System - A Practical Solution to the Key Distribution Problem. Advances in Cryptology - CRYPTO '87, Lecture Notes in Computer Science 293, pages 185-193, 1988.
-
(1988)
Lecture Notes in Computer Science 293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
22
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology - CRYPTO 2001, Lecture Notes in Computer Science 2139, pages 41-62, 2001.
-
(2001)
Lecture Notes in Computer Science 2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
23
-
-
84944319284
-
Efficient Trace and Revoke Schemes
-
Financial Cryptography 2000
-
M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. Financial Cryptography 2000, Lecture Notes in Computer Science 1962, pages 1-20, 2001.
-
(2001)
Lecture Notes in Computer Science 1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
24
-
-
84957617696
-
Threshold Traitor Tracing
-
Advances in Cryptology - CRYPTO '98
-
M. Naor and B. Pinkas. Threshold Traitor Tracing. Advances in Cryptology - CRYPTO '98, Lecture Notes in Computer Science 1462, pages 502-517, 1998.
-
(1998)
Lecture Notes in Computer Science 1462
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
26
-
-
0018545449
-
How to Share a Secret
-
A. Shamir. How to Share a Secret. Communications of the ACM 22, pages 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
27
-
-
0034247455
-
Key Agreement in Dynamic Peer Groups
-
M. Steiner, G. Tsudik and M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Transactions on Parallel and Distributed Systems 11, no. 8, pages 769-780, 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
28
-
-
0000028420
-
On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
-
D. R. Stinson. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption. Designs, Codes and Cryptography 12, pages 215-243, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
29
-
-
0005053804
-
Some New Results on Key Distribution Patterns and Broadcast Encryption
-
D. R. Stinson and T. van Trung. Some New Results on Key Distribution Patterns and Broadcast Encryption. Designs, Codes and Cryptography 15, pages 261-279, 1998.
-
(1998)
Designs, Codes and Cryptography
, vol.15
, pp. 261-279
-
-
Stinson, D.R.1
Van Trung, T.2
|