-
1
-
-
13944258256
-
A quick group key distribution scheme with entity revocation
-
Lecture Notes in Computer Science
-
J. Anzai, N. Matsuzaki and T. Matsumoto, A quick group key distribution scheme with entity revocation, Advances in Cryptology - Asiacrypt '99, Lecture Notes in Computer Science, Vol. 1716 (1999) pp. 333-347.
-
(1999)
Advances in Cryptology - Asiacrypt '99
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
2
-
-
0013107042
-
How to broadcast a secret
-
Lecture Notes in Computer Science
-
S. Berkovits, How to broadcast a secret, Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science, Vol. 547 (1991) pp. 536-541.
-
(1991)
Advances in Cryptology - Eurocrypt '91
, vol.547
, pp. 536-541
-
-
Berkovits, S.1
-
3
-
-
84948984838
-
Space requirements for broadcast encryption
-
Lecture Notes in Computer Science
-
C. Blundo and A. Cresti, Space requirements for broadcast encryption, Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science, Vol. 950 (1995) pp. 287-298.
-
(1995)
Advances in Cryptology - Eurocrypt '94
, vol.950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
6
-
-
33646153894
-
Definitions and bounds for self-healing key distribution
-
to 'appear in the Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP 2004)
-
C. Blundo, P. D'Arco and A. De Santis, Definitions and Bounds for Self-Healing Key Distribution, to 'appear in the Proceedings of the 31st International Colloquium on Automata, Languages and Programming (ICALP 2004) Lecture Notes in Computer Science, 2004.
-
(2004)
Lecture Notes in Computer Science
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
-
7
-
-
0005908666
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly-secure key distribution for dynamic conferences, Information and Computation, Vol. 146, No. 1 (1998) pp. 1-23.
-
(1998)
Information and Computation
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
0001720832
-
Generalised Beimel-Chor schemes for broadcast encryption and interactive key distribution
-
C. Blundo, L. A. Frota Mattos and D. R. Stinson, Generalised Beimel-Chor schemes for broadcast encryption and interactive key distribution, Theoretical Computer Science, Vol. 200 (1998) pp. 313-334.
-
(1998)
Theoretical Computer Science
, vol.200
, pp. 313-334
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
9
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Lecture Notes in Computer Science
-
D. Boneh, The decision Diffie-Hellman problem, Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423 (1998) pp. 48-63.
-
(1998)
Proceedings of the Third Algorithmic Number Theory Symposium
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
10
-
-
0032661699
-
Issue in multicast security: A taxonomy and efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, Issue in multicast security: A taxonomy and efficient constructions, Infocom '99 (1999) pp. 708-716.
-
(1999)
Infocom '99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
11
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
R. Canetti, T. Malkin and K. Nissim, Efficient communication-storage tradeoffs for multicast encryption, Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science, Vol. 1592 (1999) pp. 459-474.
-
(1999)
Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
12
-
-
0034188648
-
Traitor tracing
-
May
-
B. Chor, A. Fiat, M. Naor and B. Pinkas, Traitor tracing, IEEE Transactions on Information Theory, Vol. 46, No. 3 (May 2000) pp. 893-910.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
15
-
-
33745601712
-
Efficient multicast encryption schemes
-
Lecture Notes in Computer Science
-
G. Di Crescenzo and O. Kornievskaia, Efficient multicast encryption schemes, Security in Communication Network (SCN02), Lecture Notes in Computer Science, Vol. 2576 (2003) pp. 119-132.
-
(2003)
Security in Communication Network (SCN02)
, vol.2576
, pp. 119-132
-
-
Di Crescenzo, G.1
Kornievskaia, O.2
-
17
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, No. 31 (1985) pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, Issue.31
, pp. 469-472
-
-
Elgamal, T.1
-
19
-
-
84979291225
-
Broadcast encryption
-
Lecture Notes in Computer Science
-
A. Fiat and M. Naor, Broadcast encryption, Proceedings of Crypto '93, Lecture Notes in Computer Science, Vol. 773 (1994) pp. 480-491.
-
(1994)
Proceedings of Crypto '93
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
20
-
-
0013138808
-
Dynamic traitor tracing
-
A. Fiat and T. Tessa, Dynamic traitor tracing, Journal of Cryptology, Vol. 14 (2001) pp. 211-223.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 211-223
-
-
Fiat, A.1
Tessa, T.2
-
21
-
-
84957067564
-
Efficient methods for integrating traceability and broadcast encryption
-
Lecture Notes in Computer Science
-
E. Gafni, J. Staddon and Y. L. Yin, Efficient methods for integrating traceability and broadcast encryption, Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 372-387.
-
(1999)
Advances in Cryptology - Crypto '99
, vol.1666
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
22
-
-
84974588069
-
Long-lived broadcast encryption
-
Lecture Notes in Computer Science
-
J. Garay, J. Staddon and A. Wool, Long-lived broadcast encryption, Advances in Cryptology - Crypto 2000, Lecture Notes in Computer Science, Vol. 1880 (2000) pp. 333-352.
-
(2000)
Advances in Cryptology - Crypto 2000
, vol.1880
, pp. 333-352
-
-
Garay, J.1
Staddon, J.2
Wool, A.3
-
23
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Lecture Notes in Computer Science
-
D. Halevy and A. Shamir, The LSD broadcast encryption scheme, Advances in Cryptology - Crypto '02, Lecture Notes in Computer Science, Vol. 2442 (2002) pp. 47-60.
-
(2002)
Advances in Cryptology - Crypto '02
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
24
-
-
84947273176
-
Traitor tracing with constant transmission Rate
-
Lecture Notes in Computer Science
-
A. Kiayias and M. Yung, Traitor tracing with constant transmission Rate, Advances in Cryptology - Eurocrypt '02, Lecture Notes in Computer Science, Vol. 2332 (2002) pp. 450-465.
-
(2002)
Advances in Cryptology - Eurocrypt '02
, vol.2332
, pp. 450-465
-
-
Kiayias, A.1
Yung, M.2
-
25
-
-
84880901368
-
Self protecting pirates and black-box traitor tracing
-
Lecture Notes in Computer Science
-
A. Kiayias and M. Yung, Self protecting pirates and black-box traitor tracing, Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science, Vol. 2139 (2001) pp. 63-79.
-
(2001)
Advances in Cryptology - Crypto '01
, vol.2139
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
26
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Lecture Notes in Computer Science
-
R. Kumar, S. Rajagopalan and A. Sahai, Coding constructions for blacklisting problems without computational assumptions, Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science, Vol. 1666 (1999) pp. 609-623.
-
(1999)
Advances in Cryptology - Crypto '99
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
27
-
-
84930043991
-
A secure re-keying scheme with key recovery property
-
Lecture Notes in Computer Science
-
H. Kurnio, R. Safani-Naini and H. Wang, A secure re-keying scheme with key recovery property, ACISP 2002, Lecture Notes in Computer Science, Vol. 2384 (2002) pp. 40-55.
-
(2002)
ACISP 2002
, vol.2384
, pp. 40-55
-
-
Kurnio, H.1
Safani-Naini, R.2
Wang, H.3
-
28
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. K. Lenstra and E. R. Verheul, Selecting cryptographic key sizes, Journal of Cryptology, Vol. 14, No. 4 (2001) pp. 255-293.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
29
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
Lecture Notes in Computer Science
-
M. Luby and J. Staddon, Combinatorial bounds for broadcast encryption, Advances in Cryptology - Eurocrypt '98, Lecture Notes in Computer Science, Vol. 1403 (1998) pp. 512-526.
-
(1998)
Advances in Cryptology - Eurocrypt '98
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
30
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Lecture Notes in Computer Science
-
D. Naor, M. Naor and J. Lotspiech, Revocation and tracing schemes for stateless receivers, Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science, Vol. 2139 (2001) pp. 41-62.
-
(2001)
Advances in Cryptology - Crypto '01
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
31
-
-
84944319284
-
Efficient trace and revoke schemes
-
Lecture Notes in Computer Science
-
M. Naor and B. Pinkas, Efficient trace and revoke schemes, Financial Cryptography 2000, Lecture Notes in Computer Science, Vol. 1962 (2000) pp. 1-21.
-
(2000)
Financial Cryptography 2000
, vol.1962
, pp. 1-21
-
-
Naor, M.1
Pinkas, B.2
-
32
-
-
3543050471
-
Efficient self-healing key distribution with revocation capability
-
October 27-31, Washington, DC, USA
-
D. Liu, P. Ning and K. Sun, Efficient self-healing key distribution with revocation capability, Proceedings of the 10-th ACM Conference on Computer and Communications Security, October 27-31, 2003, Washington, DC, USA.
-
(2003)
Proceedings of the 10-th ACM Conference on Computer and Communications Security
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
34
-
-
84954420982
-
Trials of traced traitors, information hiding
-
B. Pfitzmann, Trials of traced traitors, information hiding, Lecture Notes in Computer Science, Vol. 1174 (1996) pp. 49-64.
-
(1996)
Lecture Notes in Computer Science
, vol.1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
37
-
-
79952238646
-
Self-healing key distribution with revocation
-
May 12-15, Berkeley, California
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin and D. Dean, Self-healing key distribution with revocation, IEEE Symposium on Security and Privacy, May 12-15, 2002, Berkeley, California.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
39
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D. R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption, Designs, Codes and Cryptography, Vol. 12 (1997) pp. 215-243.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
40
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
D. R. Stinson and T. van Trung, Some new results on key distribution patterns and broadcast encryption, Designs, Codes and Cryptography, Vol. 15 (1998) pp. 261-279.
-
(1998)
Designs, Codes and Cryptography
, vol.15
, pp. 261-279
-
-
Stinson, D.R.1
Van Trung, T.2
-
41
-
-
84890047469
-
Key preassigned traceability schemes for broadcast encryption
-
Lecture Notes in Computer Science
-
D. R. Stinson and R. Wei, Key preassigned traceability schemes for broadcast encryption, Proceedings of SAC'98, Lecture Notes in Computer Science, Vol. 1556 (1999) pp. 144-156.
-
(1999)
Proceedings of SAC'98
, vol.1556
, pp. 144-156
-
-
Stinson, D.R.1
Wei, R.2
-
42
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics, Vol. 11 (1998) pp. 41-53.
-
(1998)
SIAM Journal on Discrete Mathematics
, vol.11
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
43
-
-
0033076984
-
An application of ramp schemes to broadcast encryption
-
D. R. Stinson and R. Wei, An application of ramp schemes to broadcast encryption, Information Processing Letters, Vol. 69 (1999) pp. 131-135.
-
(1999)
Information Processing Letters
, vol.69
, pp. 131-135
-
-
Stinson, D.R.1
Wei, R.2
-
44
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
D. M. Wallner, E. J. Harder and R. C. Agee, Key management for multicast: Issues and architectures, Internet Draft available from http://www.ietf.org/ rfc/rfc2627.txt
-
Internet Draft
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
|