메뉴 건너뛰기




Volumn 2, Issue , 2007, Pages 512-518

Authenticated broadcast encryption scheme

Author keywords

Bilinear map; Broadcast encryption; Cryptography

Indexed keywords

BROADCASTING; MOBILE DEVICES; PERSONAL DIGITAL ASSISTANTS; PUBLIC KEY CRYPTOGRAPHY; WIRELESS NETWORKS;

EID: 35248864394     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINAW.2007.104     Document Type: Conference Paper
Times cited : (3)

References (22)
  • 1
    • 84937428623 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-based Cryptosystems
    • Advanees in Cryptology, Crypto'02, Springer-Verlag
    • P. Barreto, H. Kim, B. Lynn, and M. Scott "Efficient Algorithms for Pairing-based Cryptosystems," Advanees in Cryptology - Crypto'02, Lecture Notes in Computer Science vol.2442, pp. 354-369, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 354-369
    • Barreto, P.1    Kim, H.2    Lynn, B.3    Scott, M.4
  • 2
    • 85030481487 scopus 로고
    • How to broadcast a secret
    • Advances in Cryptology, Eurocrypt'91, Springer-Verlag
    • S. Berkovits, "How to broadcast a secret," Advances in Cryptology - Eurocrypt'91, Lecture Notes in Computer Science vol.547, pp. 535-541, Springer-Verlag, 1991.
    • (1991) Lecture Notes in Computer Science , vol.547 , pp. 535-541
    • Berkovits, S.1
  • 3
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Advances in Cryptology, Crypto'05, Springer-Verlag
    • D. Boneh, C. Gentry and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," Advances in Cryptology - Crypto'05, Lecture Notes in Computer Science, vol.3621, pp.258-275, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 4
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Advances in Cryptology, Eurocrypt'04, Springer-Verlag
    • R. Canetti, S. Halevi and J. Katz, "Chosen-ciphertext security from identity-based encryption," Advances in Cryptology - Eurocrypt'04, Lecture Notes in Computer Science vol.3027, pp. 207-222, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 6
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advances in Cryptology, Crypto'98, Springer-Verlag
    • R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology - Crypto'98, Lecture Notes in Computer Science vol.1462, pp. 13-25, Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 7
    • 20444447508 scopus 로고    scopus 로고
    • Fault tolerant and distributed broadcast encryption
    • Topics in Cryptology, CT-RSA'03, Springer-Verlag
    • P. D'Arco and D. Stinson, "Fault tolerant and distributed broadcast encryption," Topics in Cryptology - CT-RSA'03, Lecture Notes in Computer Science, vol.2612, pp.263-280, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2612 , pp. 263-280
    • D'Arco, P.1    Stinson, D.2
  • 8
    • 35248901924 scopus 로고    scopus 로고
    • Public key broadcast encryption for stateless receivers
    • Digital Right Management, DRM'02, Springer-Verlag
    • Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," Digital Right Management - DRM'02, Lecture Notes in Computer Science, vol.2696, pp.61-80, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2696 , pp. 61-80
    • Dodis, Y.1    Fazio, N.2
  • 9
    • 35248899841 scopus 로고    scopus 로고
    • Public key broadcast encryption secure against adaptive chosen ciphertext attack
    • Public Key Cryptography, PKC'03, Springer-Verlag
    • Y. Dodis and N. Fazio, "Public key broadcast encryption secure against adaptive chosen ciphertext attack," Public Key Cryptography - PKC'03, Lecture Notes in Computer Science, vol.2567, pp.100-115, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 10
    • 20444502239 scopus 로고    scopus 로고
    • An ID-Based broadcast encryption scheme for key distribution
    • X. Du, Y. Wang, J. Ge, and Y. Wang, "An ID-Based broadcast encryption scheme for key distribution," IEEE Trans. on Broadcasting, vol.51, no.2, pp.264-266, 2005.
    • (2005) IEEE Trans. on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 11
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Advances in Cryptology, Crypto'93, Springer-Verlag
    • A. Fiat and M. Naor, "Broadcast encryption," Advances in Cryptology - Crypto'93, Lecture Notes in Computer Science, vol.773, pp.480-491, Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 12
    • 84937435227 scopus 로고    scopus 로고
    • The lsd broadcast encryption scheme
    • Advances in Cryptology, Crypto'02, Springer-Verlag
    • D. Halevy and A. Shamir, "The lsd broadcast encryption scheme," Advances in Cryptology - Crypto'02, Lecture Notes in Computer Science, vol.2442, pp.47-60, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 13
    • 33745140894 scopus 로고    scopus 로고
    • Generic transformation for scalable broadcast encryption schemes
    • Advances in Cryptology, Crypto'05, Springer-Verlag
    • J. Y. Hwang, D. H. Lee, and J. Lim, "Generic transformation for scalable broadcast encryption schemes," Advances in Cryptology - Crypto'05, Lecture Notes in Computer Science, vol.3621, pp.276-292, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 276-292
    • Hwang, J.Y.1    Lee, D.H.2    Lim, J.3
  • 14
    • 24944542406 scopus 로고    scopus 로고
    • One-way chain based broadcast encryption scheme
    • Advances in Cryptology, Eurocrypt'05, Springer-Verlag
    • N. S. Jho, J. Y. Hwang, J. H. Cheon, M. Kim, D. H. Lee, and E. S. Yoo "One-way chain based broadcast encryption scheme," Advances in Cryptology - Eurocrypt'05, Lecture Notes in Computer Science, vol.3494, pp.559-574, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 559-574
    • Jho, N.S.1    Hwang, J.Y.2    Cheon, J.H.3    Kim, M.4    Lee, D.H.5    Yoo, E.S.6
  • 17
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Advances in Cryptology, Crypto'01, Springer-Verlag
    • D. Noar, M. Noar, and J. Loptspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology - Crypto'01, Lecture Notes in Computer Science, vol.2139, pp.41-62, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Noar, D.1    Noar, M.2    Loptspiech, J.3
  • 19
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • D. R. Stinson, "On some methods for unconditionally secure key distribution and broadcast encryption," Designs, Codes and Cryptography, vol.12, no.3, pp.215-243, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , Issue.3 , pp. 215-243
    • Stinson, D.R.1
  • 20
    • 0344395626 scopus 로고    scopus 로고
    • Key management and distribution for secure multimedia multicast
    • W Trappe, J. Song, R. Poovendran, and K. J. Ray Liu, "Key management and distribution for secure multimedia multicast," IEEE trans. on Multimedia, vol.5, no.4, pp.544-557, 2003.
    • (2003) IEEE trans. on Multimedia , vol.5 , Issue.4 , pp. 544-557
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Ray Liu, K.J.4
  • 21
    • 33645152340 scopus 로고    scopus 로고
    • CASM: A content/aware protocol for secure video multicast
    • H. Yin, C. Lin, F. Qiu, J. Liu, G. Min, and B. Li, "CASM: A content/aware protocol for secure video multicast," IEEE trans. on Multimedia, vol.8, no.2, pp.270-277, 2006.
    • (2006) IEEE trans. on Multimedia , vol.8 , Issue.2 , pp. 270-277
    • Yin, H.1    Lin, C.2    Qiu, F.3    Liu, J.4    Min, G.5    Li, B.6
  • 22
    • 85088055540 scopus 로고    scopus 로고
    • Efficient broadcast encryption using multiple interpolation and methods
    • Information Security and Cryptology, ICISC04, Springer-Verlag
    • E. Yoo, N. Jho, J. Cheon, and M. Kim, "Efficient broadcast encryption using multiple interpolation and methods," Information Security and Cryptology - ICISC04, Lecture Notes in Computer Science, vol.3506, pp.47-60, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3506 , pp. 47-60
    • Yoo, E.1    Jho, N.2    Cheon, J.3    Kim, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.