메뉴 건너뛰기




Volumn 18, Issue 4, 2007, Pages 811-817

Broadcast group-oriented encryption secure against chosen ciphertext attack

Author keywords

broadcast; chosen ciphertext attack; group oriented encryption; public verification.

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; GROUP-ORIENTED ENCRYPTION; PUBLIC VERIFICATION; RANDOM ORACLE MODEL; TRADITIONAL BROADCAST ENCRYPTION;

EID: 37549042833     PISSN: 10044132     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1004-4132(08)60025-0     Document Type: Article
Times cited : (7)

References (13)
  • 1
    • 84979291225 scopus 로고
    • Broadcast encryption. Advances in Cryptology-CRYPTO Springer-Verlag
    • Fiat A., and Naor M. Broadcast encryption. Advances in Cryptology-CRYPTO Springer-Verlag. Lecture Notes in Computer Science 773 (1993) 480-491
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 2
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Springer-Verlag, Lecture Notes in Computer Science
    • Naor D., Naor M., and Lotspiech J. Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology-CRYPTO 2139 (2001), Springer-Verlag, Lecture Notes in Computer Science 41-62
    • (2001) Advances in Cryptology-CRYPTO , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 3
    • 24944584332 scopus 로고    scopus 로고
    • Goodrich MT, Sun JZ, Tamassia R. Efficient tree-based revocation in groups of low-state devices. In Proceedings of Cryptology-CRYPTO 2004. Springer-Verlag, Lecture Notes in Computer Science, 2004, 3152: 511-527.
  • 4
    • 33745166648 scopus 로고    scopus 로고
    • Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
    • Springer-Verlag, Lecture Notes in Computer Science
    • Boneh D., Gentry C., and Waters B. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. Advances in Cryptology-CRYPTO 3621 (2005), Springer-Verlag, Lecture Notes in Computer Science 258-275
    • (2005) Advances in Cryptology-CRYPTO , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 5
    • 84937435227 scopus 로고    scopus 로고
    • Halevy D, Shamir A. The 1sd broadcast encryption scheme. In Proceedings of Cryptology-CRYPTO, Springer-Verlag, Lecture Notes in Computer Science, 2002, 2442: 47-60.
  • 6
    • 35248901924 scopus 로고    scopus 로고
    • Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop, Springer-Verlag, Lecture Notes in Computer Science, 2002, 2696: 61-80.
  • 8
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial bounds for broadcast encryption
    • Springer-Verlag, Lecture Notes in Computer Science
    • Luby M., and Staddon J. Combinatorial bounds for broadcast encryption. Advances in Cryptology-EuroCrypt'98 1403 (1998), Springer-Verlag, Lecture Notes in Computer Science 512-526
    • (1998) Advances in Cryptology-EuroCrypt'98 , vol.1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 9
    • 84974588069 scopus 로고    scopus 로고
    • Long-Lived Broadcast Encryption
    • Springer-Verlag, Lecture Notes in Computer Science
    • Garay A., Staddon J., and Wool A. Long-Lived Broadcast Encryption. Advances in Cryptology-CRYPTO 2000 1880 (2000), Springer-Verlag, Lecture Notes in Computer Science 333-352
    • (2000) Advances in Cryptology-CRYPTO 2000 , vol.1880 , pp. 333-352
    • Garay, A.1    Staddon, J.2    Wool, A.3
  • 10
    • 35248899841 scopus 로고    scopus 로고
    • Public key broadcast encryption secure against adaptive chosen ciphertext attack. In Workshop on Public Key Cryptography (PKC)
    • Dodis Y., and Fazio N. Public key broadcast encryption secure against adaptive chosen ciphertext attack. In Workshop on Public Key Cryptography (PKC). Lecture Notes in Computer Science 2567 (2003) 100-115
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 13
    • 35048821512 scopus 로고    scopus 로고
    • Kim HJ, Lee SM, Lee DH. Constant-Round Authenticated group key exchange for dynamic groups. In proceedings of Asiacrypt, LNCS, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.