메뉴 건너뛰기




Volumn 32, Issue 1-3, 2004, Pages 15-44

Design of self-healing key distribution schemes

Author keywords

Group communication; Key distribution; Self healing

Indexed keywords

BROADCASTING; CHANNEL CAPACITY; INTERNET; PACKET NETWORKS; PROBABILITY; SECURITY OF DATA;

EID: 3543067539     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:DESI.0000029210.20690.3f     Document Type: Conference Paper
Times cited : (103)

References (45)
  • 1
    • 13944258256 scopus 로고    scopus 로고
    • A quick group key distribution scheme with entity revocation
    • Lecture Notes in Computer Science
    • J. Anzai, N. Matsuzaki and T. Matsumoto, A quick group key distribution scheme with entity revocation, Advances in Cryptology - Asiacrypt '99, Lecture Notes in Computer Science, Vol. 1716 (1999) pp. 333-347.
    • (1999) Advances in Cryptology - Asiacrypt '99 , vol.1716 , pp. 333-347
    • Anzai, J.1    Matsuzaki, N.2    Matsumoto, T.3
  • 2
    • 0013107042 scopus 로고
    • How to broadcast a secret
    • Lecture Notes in Computer Science
    • S. Berkovits, How to broadcast a secret, Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science, Vol. 547 (1991) pp. 536-541.
    • (1991) Advances in Cryptology - Eurocrypt '91 , vol.547 , pp. 536-541
    • Berkovits, S.1
  • 3
    • 84948984838 scopus 로고
    • Space requirements for broadcast encryption
    • Lecture Notes in Computer Science
    • C. Blundo and A. Cresti, Space requirements for broadcast encryption, Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950 (1995) pp. 287-298.
    • (1995) Advances in Cryptology - Eurocrypt '94 , vol.950 , pp. 287-298
    • Blundo, C.1    Cresti, A.2
  • 6
    • 33646153894 scopus 로고    scopus 로고
    • Definitions and bounds for self-healing key distribution
    • to 'appear in the Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP 2004)
    • C. Blundo, P. D'Arco and A. De Santis, Definitions and Bounds for Self-Healing Key Distribution, to 'appear in the Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP 2004) Lecture Notes in Computer Science, 2004.
    • (2004) Lecture Notes in Computer Science
    • Blundo, C.1    D'Arco, P.2    De Santis, A.3
  • 8
    • 0001720832 scopus 로고    scopus 로고
    • Generalised Beimel-Chor schemes for broadcast encryption and interactive key distribution
    • C. Blundo, L. A. Frota Mattos and D. R. Stinson, Generalised Beimel-Chor schemes for broadcast encryption and interactive key distribution, Theoretical Computer Science, Vol. 200 (1998) pp. 313-334.
    • (1998) Theoretical Computer Science , vol.200 , pp. 313-334
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 9
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • Lecture Notes in Computer Science
    • D. Boneh, The decision Diffie-Hellman problem, Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423 (1998) pp. 48-63.
    • (1998) Proceedings of the Third Algorithmic Number Theory Symposium , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 15
    • 33745601712 scopus 로고    scopus 로고
    • Efficient multicast encryption schemes
    • Lecture Notes in Computer Science
    • G. Di Crescenzo and O. Kornievskaia, Efficient multicast encryption schemes, Security in Communication Network (SCN02), Lecture Notes in Computer Science, Vol. 2576 (2003) pp. 119-132.
    • (2003) Security in Communication Network (SCN02) , vol.2576 , pp. 119-132
    • Di Crescenzo, G.1    Kornievskaia, O.2
  • 17
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, No. 31 (1985) pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , Issue.31 , pp. 469-472
    • Elgamal, T.1
  • 19
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Lecture Notes in Computer Science
    • A. Fiat and M. Naor, Broadcast encryption, Proceedings of Crypto '93, Lecture Notes in Computer Science, Vol. 773 (1994) pp. 480-491.
    • (1994) Proceedings of Crypto '93 , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 20
    • 0013138808 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • A. Fiat and T. Tessa, Dynamic traitor tracing, Journal of Cryptology, Vol. 14 (2001) pp. 211-223.
    • (2001) Journal of Cryptology , vol.14 , pp. 211-223
    • Fiat, A.1    Tessa, T.2
  • 21
    • 84957067564 scopus 로고    scopus 로고
    • Efficient methods for integrating traceability and broadcast encryption
    • Lecture Notes in Computer Science
    • E. Gafni, J. Staddon and Y. L. Yin, Efficient methods for integrating traceability and broadcast encryption, Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 372-387.
    • (1999) Advances in Cryptology - Crypto '99 , vol.1666 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 22
    • 84974588069 scopus 로고    scopus 로고
    • Long-lived broadcast encryption
    • Lecture Notes in Computer Science
    • J. Garay, J. Staddon and A. Wool, Long-lived broadcast encryption, Advances in Cryptology - Crypto 2000, Lecture Notes in Computer Science, Vol. 1880 (2000) pp. 333-352.
    • (2000) Advances in Cryptology - Crypto 2000 , vol.1880 , pp. 333-352
    • Garay, J.1    Staddon, J.2    Wool, A.3
  • 23
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • Lecture Notes in Computer Science
    • D. Halevy and A. Shamir, The LSD broadcast encryption scheme, Advances in Cryptology - Crypto '02, Lecture Notes in Computer Science, Vol. 2442 (2002) pp. 47-60.
    • (2002) Advances in Cryptology - Crypto '02 , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 24
    • 84947273176 scopus 로고    scopus 로고
    • Traitor tracing with constant transmission Rate
    • Lecture Notes in Computer Science
    • A. Kiayias and M. Yung, Traitor tracing with constant transmission Rate, Advances in Cryptology - Eurocrypt '02, Lecture Notes in Computer Science, Vol. 2332 (2002) pp. 450-465.
    • (2002) Advances in Cryptology - Eurocrypt '02 , vol.2332 , pp. 450-465
    • Kiayias, A.1    Yung, M.2
  • 25
    • 84880901368 scopus 로고    scopus 로고
    • Self protecting pirates and black-box traitor tracing
    • Lecture Notes in Computer Science
    • A. Kiayias and M. Yung, Self protecting pirates and black-box traitor tracing, Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science, Vol. 2139 (2001) pp. 63-79.
    • (2001) Advances in Cryptology - Crypto '01 , vol.2139 , pp. 63-79
    • Kiayias, A.1    Yung, M.2
  • 26
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • Lecture Notes in Computer Science
    • R. Kumar, S. Rajagopalan and A. Sahai, Coding constructions for blacklisting problems without computational assumptions, Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 609-623.
    • (1999) Advances in Cryptology - Crypto '99 , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 27
    • 84930043991 scopus 로고    scopus 로고
    • A secure re-keying scheme with key recovery property
    • Lecture Notes in Computer Science
    • H. Kurnio, R. Safani-Naini and H. Wang, A secure re-keying scheme with key recovery property, ACISP 2002, Lecture Notes in Computer Science, Vol. 2384 (2002) pp. 40-55.
    • (2002) ACISP 2002 , vol.2384 , pp. 40-55
    • Kurnio, H.1    Safani-Naini, R.2    Wang, H.3
  • 28
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • A. K. Lenstra and E. R. Verheul, Selecting cryptographic key sizes, Journal of Cryptology, Vol. 14, No. 4 (2001) pp. 255-293.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 29
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial bounds for broadcast encryption
    • Lecture Notes in Computer Science
    • M. Luby and J. Staddon, Combinatorial bounds for broadcast encryption, Advances in Cryptology - Eurocrypt '98, Lecture Notes in Computer Science, Vol. 1403 (1998) pp. 512-526.
    • (1998) Advances in Cryptology - Eurocrypt '98 , vol.1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 30
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Lecture Notes in Computer Science
    • D. Naor, M. Naor and J. Lotspiech, Revocation and tracing schemes for stateless receivers, Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science, Vol. 2139 (2001) pp. 41-62.
    • (2001) Advances in Cryptology - Crypto '01 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 31
    • 84944319284 scopus 로고    scopus 로고
    • Efficient trace and revoke schemes
    • Lecture Notes in Computer Science
    • M. Naor and B. Pinkas, Efficient trace and revoke schemes, Financial Cryptography 2000, Lecture Notes in Computer Science, Vol. 1962 (2000) pp. 1-21.
    • (2000) Financial Cryptography 2000 , vol.1962 , pp. 1-21
    • Naor, M.1    Pinkas, B.2
  • 34
    • 84954420982 scopus 로고    scopus 로고
    • Trials of traced traitors, information hiding
    • B. Pfitzmann, Trials of traced traitors, information hiding, Lecture Notes in Computer Science, Vol. 1174 (1996) pp. 49-64.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 49-64
    • Pfitzmann, B.1
  • 39
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • D. R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Designs, Codes and Cryptography, Vol. 12 (1997) pp. 215-243.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 40
    • 0005053804 scopus 로고    scopus 로고
    • Some new results on key distribution patterns and broadcast encryption
    • D. R. Stinson and T. van Trung, Some new results on key distribution patterns and broadcast encryption, Designs, Codes and Cryptography, Vol. 15 (1998) pp. 261-279.
    • (1998) Designs, Codes and Cryptography , vol.15 , pp. 261-279
    • Stinson, D.R.1    Van Trung, T.2
  • 41
    • 84890047469 scopus 로고    scopus 로고
    • Key preassigned traceability schemes for broadcast encryption
    • Lecture Notes in Computer Science
    • D. R. Stinson and R. Wei, Key preassigned traceability schemes for broadcast encryption, Proceedings of SAC'98, Lecture Notes in Computer Science, Vol. 1556 (1999) pp. 144-156.
    • (1999) Proceedings of SAC'98 , vol.1556 , pp. 144-156
    • Stinson, D.R.1    Wei, R.2
  • 42
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics, Vol. 11 (1998) pp. 41-53.
    • (1998) SIAM Journal on Discrete Mathematics , vol.11 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 43
    • 0033076984 scopus 로고    scopus 로고
    • An application of ramp schemes to broadcast encryption
    • D. R. Stinson and R. Wei, An application of ramp schemes to broadcast encryption, Information Processing Letters, Vol. 69 (1999) pp. 131-135.
    • (1999) Information Processing Letters , vol.69 , pp. 131-135
    • Stinson, D.R.1    Wei, R.2
  • 44
    • 0003657439 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • D. M. Wallner, E. J. Harder and R. C. Agee, Key management for multicast: Issues and architectures, Internet Draft available from http://www.ietf.org/ rfc/rfc2627.txt
    • Internet Draft
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.