-
1
-
-
84937428623
-
Efficient Algorithms for Pairing-based Cryptosystems
-
Advanees in Cryptology, Crypto'02, Springer-Verlag
-
P. Barreto, H. Kim, B. Lynn, and M. Scott "Efficient Algorithms for Pairing-based Cryptosystems," Advanees in Cryptology - Crypto'02, Lecture Notes in Computer Science vol.2442, pp. 354-369, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-369
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
2
-
-
85030481487
-
How to broadcast a secret
-
Advances in Cryptology, Eurocrypt'91, Springer-Verlag
-
S. Berkovits, "How to broadcast a secret," Advances in Cryptology - Eurocrypt'91, Lecture Notes in Computer Science vol.547, pp. 535-541, Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 535-541
-
-
Berkovits, S.1
-
3
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology, Crypto'05, Springer-Verlag
-
D. Boneh, C. Gentry and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," Advances in Cryptology - Crypto'05, Lecture Notes in Computer Science, vol.3621, pp.258-275, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
4
-
-
35048852705
-
Chosen-ciphertext security from identity-based encryption
-
Advances in Cryptology, Eurocrypt'04, Springer-Verlag
-
R. Canetti, S. Halevi and J. Katz, "Chosen-ciphertext security from identity-based encryption," Advances in Cryptology - Eurocrypt'04, Lecture Notes in Computer Science vol.3027, pp. 207-222, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 207-222
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
6
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advances in Cryptology, Crypto'98, Springer-Verlag
-
R. Cramer and V. Shoup, "A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack," Advances in Cryptology - Crypto'98, Lecture Notes in Computer Science vol.1462, pp. 13-25, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
7
-
-
20444447508
-
Fault tolerant and distributed broadcast encryption
-
Topics in Cryptology, CT-RSA'03, Springer-Verlag
-
P. D'Arco and D. Stinson, "Fault tolerant and distributed broadcast encryption," Topics in Cryptology - CT-RSA'03, Lecture Notes in Computer Science, vol.2612, pp.263-280, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
, pp. 263-280
-
-
D'Arco, P.1
Stinson, D.2
-
8
-
-
35248901924
-
Public key broadcast encryption for stateless receivers
-
Digital Right Management, DRM'02, Springer-Verlag
-
Y. Dodis and N. Fazio, "Public key broadcast encryption for stateless receivers," Digital Right Management - DRM'02, Lecture Notes in Computer Science, vol.2696, pp.61-80, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2696
, pp. 61-80
-
-
Dodis, Y.1
Fazio, N.2
-
9
-
-
35248899841
-
Public key broadcast encryption secure against adaptive chosen ciphertext attack
-
Public Key Cryptography, PKC'03, Springer-Verlag
-
Y. Dodis and N. Fazio, "Public key broadcast encryption secure against adaptive chosen ciphertext attack," Public Key Cryptography - PKC'03, Lecture Notes in Computer Science, vol.2567, pp.100-115, Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
10
-
-
20444502239
-
An ID-Based broadcast encryption scheme for key distribution
-
X. Du, Y. Wang, J. Ge, and Y. Wang, "An ID-Based broadcast encryption scheme for key distribution," IEEE Trans. on Broadcasting, vol.51, no.2, pp.264-266, 2005.
-
(2005)
IEEE Trans. on Broadcasting
, vol.51
, Issue.2
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
11
-
-
84979291225
-
Broadcast encryption
-
Advances in Cryptology, Crypto'93, Springer-Verlag
-
A. Fiat and M. Naor, "Broadcast encryption," Advances in Cryptology - Crypto'93, Lecture Notes in Computer Science, vol.773, pp.480-491, Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
84937435227
-
The lsd broadcast encryption scheme
-
Advances in Cryptology, Crypto'02, Springer-Verlag
-
D. Halevy and A. Shamir, "The lsd broadcast encryption scheme," Advances in Cryptology - Crypto'02, Lecture Notes in Computer Science, vol.2442, pp.47-60, Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
13
-
-
33745140894
-
Generic transformation for scalable broadcast encryption schemes
-
Advances in Cryptology, Crypto'05, Springer-Verlag
-
J. Y. Hwang, D. H. Lee, and J. Lim, "Generic transformation for scalable broadcast encryption schemes," Advances in Cryptology - Crypto'05, Lecture Notes in Computer Science, vol.3621, pp.276-292, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 276-292
-
-
Hwang, J.Y.1
Lee, D.H.2
Lim, J.3
-
14
-
-
24944542406
-
One-way chain based broadcast encryption scheme
-
Advances in Cryptology, Eurocrypt'05, Springer-Verlag
-
N. S. Jho, J. Y. Hwang, J. H. Cheon, M. Kim, D. H. Lee, and E. S. Yoo "One-way chain based broadcast encryption scheme," Advances in Cryptology - Eurocrypt'05, Lecture Notes in Computer Science, vol.3494, pp.559-574, Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 559-574
-
-
Jho, N.S.1
Hwang, J.Y.2
Cheon, J.H.3
Kim, M.4
Lee, D.H.5
Yoo, E.S.6
-
17
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology, Crypto'01, Springer-Verlag
-
D. Noar, M. Noar, and J. Loptspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology - Crypto'01, Lecture Notes in Computer Science, vol.2139, pp.41-62, Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Noar, D.1
Noar, M.2
Loptspiech, J.3
-
19
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D. R. Stinson, "On some methods for unconditionally secure key distribution and broadcast encryption," Designs, Codes and Cryptography, vol.12, no.3, pp.215-243, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, Issue.3
, pp. 215-243
-
-
Stinson, D.R.1
-
20
-
-
0344395626
-
Key management and distribution for secure multimedia multicast
-
W Trappe, J. Song, R. Poovendran, and K. J. Ray Liu, "Key management and distribution for secure multimedia multicast," IEEE trans. on Multimedia, vol.5, no.4, pp.544-557, 2003.
-
(2003)
IEEE trans. on Multimedia
, vol.5
, Issue.4
, pp. 544-557
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Ray Liu, K.J.4
-
21
-
-
33645152340
-
CASM: A content/aware protocol for secure video multicast
-
H. Yin, C. Lin, F. Qiu, J. Liu, G. Min, and B. Li, "CASM: A content/aware protocol for secure video multicast," IEEE trans. on Multimedia, vol.8, no.2, pp.270-277, 2006.
-
(2006)
IEEE trans. on Multimedia
, vol.8
, Issue.2
, pp. 270-277
-
-
Yin, H.1
Lin, C.2
Qiu, F.3
Liu, J.4
Min, G.5
Li, B.6
-
22
-
-
85088055540
-
Efficient broadcast encryption using multiple interpolation and methods
-
Information Security and Cryptology, ICISC04, Springer-Verlag
-
E. Yoo, N. Jho, J. Cheon, and M. Kim, "Efficient broadcast encryption using multiple interpolation and methods," Information Security and Cryptology - ICISC04, Lecture Notes in Computer Science, vol.3506, pp.47-60, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3506
, pp. 47-60
-
-
Yoo, E.1
Jho, N.2
Cheon, J.3
Kim, M.4
|