메뉴 건너뛰기




Volumn 4883 LNCS, Issue , 2009, Pages 46-64

Optimising sd and lsd in presence of non-uniform probabilities of revocation

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST ENCRYPTION; BROADCAST ENCRYPTION SCHEMES; CAMPBELL; CHARACTERISATION; CODEWORD LENGTH; CODING PROBLEMS; CODING THEORY; KEY ASSIGNMENT; KEY STORAGE; LAYERED SUBSET DIFFERENCE; NON-UNIFORM PROBABILITY; NONUNIFORM; OPTIMALITY CRITERIA; SELECTION PROBLEMS; SOURCE-CODING; STATELESS RECEIVER; SUBSET DIFFERENCE METHODS; SUITABLE SOLUTIONS;

EID: 70549098091     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10230-1_4     Document Type: Conference Paper
Times cited : (2)

References (24)
  • 1
    • 33947428405 scopus 로고    scopus 로고
    • Source coding for campbell's penalties
    • Baer, M.: Source coding for campbell's penalties. IEEE Transactions on Information Theory 52(10), 4380-4393 (2006)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.10 , pp. 4380-4393
    • Baer, M.1
  • 2
    • 85030481487 scopus 로고
    • How to broadcast a secret
    • Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
    • Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535-541. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.547 , pp. 535-541
    • Berkovits, S.1
  • 4
    • 0032627571 scopus 로고    scopus 로고
    • Key management for secure internet multicast using boolean function minimization techniques
    • Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of IEEE INFOCOMM 1999, vol. 2, pp. 689-698 (1999)
    • (1999) Proceedings of IEEE INFOCOMM , vol.2 , pp. 689-698
    • Chang, I.1    Engel, R.2    Kandlur, D.3    Pendarakis, D.4    Saha, D.5
  • 6
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459-474. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 9
    • 51249175955 scopus 로고
    • Families of finite subsets in which no set is covered by the union of r others
    • Erdos, P., Frankl, P., Furedi, Z.: Families of finite subsets in which no set is covered by the union of r others. Israel Journal of Mathematics (51), 75-89 (1985)
    • (1985) Israel Journal of Mathematics , vol.51 , pp. 75-89
    • Erdos, P.1    Frankl, P.2    Furedi, Z.3
  • 10
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 11
    • 24944584332 scopus 로고    scopus 로고
    • Efficient tree-based revocation in groups of low-state devices
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511-527. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 511-527
    • Goodrich, M.T.1    Sun, J.Z.2    Tamassia, R.3
  • 12
    • 33750079254 scopus 로고    scopus 로고
    • Hwang, Y.H., Lee, P.J.: Efficient broadcast encryption scheme with log-key storage. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 281-295. Springer, Heidelberg (2006)
    • Hwang, Y.H., Lee, P.J.: Efficient broadcast encryption scheme with log-key storage. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 281-295. Springer, Heidelberg (2006)
  • 13
    • 33745140894 scopus 로고    scopus 로고
    • Generic transformation for scalable broadcast encryption schemes
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Hwang, J.Y., Lee, D.H., Lim, J.: Generic transformation for scalable broadcast encryption schemes. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 276-292. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 276-292
    • Hwang, J.Y.1    Lee, D.H.2    Lim, J.3
  • 14
    • 84937435227 scopus 로고    scopus 로고
    • The LSD broadcast encryption scheme
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 47-60
    • Halevy, D.1    Shamir, A.2
  • 15
    • 24944542406 scopus 로고    scopus 로고
    • One-way chain based broadcast encryption schemes
    • Cramer, R, ed, EURO-CRYPT 2005, Springer, Heidelberg
    • Jho, N., Hwang, J.Y., Cheon, J.H., Kim, M., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Cramer, R. (ed.) EURO-CRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 559-574
    • Jho, N.1    Hwang, J.Y.2    Cheon, J.H.3    Kim, M.4    Lee, D.H.5    Yoo, E.S.6
  • 17
    • 25444488186 scopus 로고    scopus 로고
    • Optimal communication complexity of generic multicast key distribution
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 153-170. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 153-170
    • Micciancio, D.1    Panjwani, S.2
  • 18
    • 84880852861 scopus 로고    scopus 로고
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, 2139, pp. 41-62. Springer, Heidelberg (2001), Full version, http://www.wisdom.weizmann.ac. il/~naor/
    • Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001), Full version, http://www.wisdom.weizmann.ac. il/~naor/
  • 19
    • 0035504627 scopus 로고    scopus 로고
    • An information theoretic analysis of rooted-tree based secure multicast key distribution schemes
    • Poovendran, R., Baras, J.S.: An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. IEEE Transactions on Information Theory 47(7), 2824-2834 (2001);
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 2824-2834
    • Poovendran, R.1    Baras, J.S.2
  • 20
    • 70549086673 scopus 로고    scopus 로고
    • Preliminary version In: Wiener, M. (ed.) CRYPTO 1999. LNCS, 1666, p. 624. Springer, Heidelberg (1999)
    • Preliminary version In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 624. Springer, Heidelberg (1999)
  • 21
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444-458 (2003)
    • (2003) IEEE Transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 23
    • 0002360030 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • ACM, New York
    • Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. In: Proceedings ACM SIGCOMM 1998. ACM, New York (1998)
    • (1998) Proceedings ACM SIGCOMM
    • Wong, C.1    Gouda, M.2    Lam, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.