-
1
-
-
84979291225
-
Broadcast encryption. Advances in Cryptology-CRYPTO Springer-Verlag
-
Fiat A., and Naor M. Broadcast encryption. Advances in Cryptology-CRYPTO Springer-Verlag. Lecture Notes in Computer Science 773 (1993) 480-491
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
Springer-Verlag, Lecture Notes in Computer Science
-
Naor D., Naor M., and Lotspiech J. Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology-CRYPTO 2139 (2001), Springer-Verlag, Lecture Notes in Computer Science 41-62
-
(2001)
Advances in Cryptology-CRYPTO
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
3
-
-
24944584332
-
-
Goodrich MT, Sun JZ, Tamassia R. Efficient tree-based revocation in groups of low-state devices. In Proceedings of Cryptology-CRYPTO 2004. Springer-Verlag, Lecture Notes in Computer Science, 2004, 3152: 511-527.
-
-
-
-
4
-
-
33745166648
-
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
-
Springer-Verlag, Lecture Notes in Computer Science
-
Boneh D., Gentry C., and Waters B. Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. Advances in Cryptology-CRYPTO 3621 (2005), Springer-Verlag, Lecture Notes in Computer Science 258-275
-
(2005)
Advances in Cryptology-CRYPTO
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
5
-
-
84937435227
-
-
Halevy D, Shamir A. The 1sd broadcast encryption scheme. In Proceedings of Cryptology-CRYPTO, Springer-Verlag, Lecture Notes in Computer Science, 2002, 2442: 47-60.
-
-
-
-
6
-
-
35248901924
-
-
Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers. In Proceedings of the Digital Rights Management Workshop, Springer-Verlag, Lecture Notes in Computer Science, 2002, 2696: 61-80.
-
-
-
-
8
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
Springer-Verlag, Lecture Notes in Computer Science
-
Luby M., and Staddon J. Combinatorial bounds for broadcast encryption. Advances in Cryptology-EuroCrypt'98 1403 (1998), Springer-Verlag, Lecture Notes in Computer Science 512-526
-
(1998)
Advances in Cryptology-EuroCrypt'98
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
9
-
-
84974588069
-
Long-Lived Broadcast Encryption
-
Springer-Verlag, Lecture Notes in Computer Science
-
Garay A., Staddon J., and Wool A. Long-Lived Broadcast Encryption. Advances in Cryptology-CRYPTO 2000 1880 (2000), Springer-Verlag, Lecture Notes in Computer Science 333-352
-
(2000)
Advances in Cryptology-CRYPTO 2000
, vol.1880
, pp. 333-352
-
-
Garay, A.1
Staddon, J.2
Wool, A.3
-
10
-
-
35248899841
-
Public key broadcast encryption secure against adaptive chosen ciphertext attack. In Workshop on Public Key Cryptography (PKC)
-
Dodis Y., and Fazio N. Public key broadcast encryption secure against adaptive chosen ciphertext attack. In Workshop on Public Key Cryptography (PKC). Lecture Notes in Computer Science 2567 (2003) 100-115
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 100-115
-
-
Dodis, Y.1
Fazio, N.2
-
13
-
-
35048821512
-
-
Kim HJ, Lee SM, Lee DH. Constant-Round Authenticated group key exchange for dynamic groups. In proceedings of Asiacrypt, LNCS, 2004.
-
-
-
|