메뉴 건너뛰기




Volumn 54, Issue 3, 2010, Pages 377-386

Attribute-based on-demand multicast group setup with membership anonymity

Author keywords

Anonymity; Attribute based encryption; Group key; Multicast

Indexed keywords

CIPHERTEXTS; COMPUTATIONAL OVERHEADS; GROUP KEY; GROUP MEMBERS; GROUP MEMBERSHIPS; GROUP SIZE; MULTICAST GROUPS; MULTICASTS; NOVEL DESIGN; ON-DEMAND; SCALABLE SOLUTION; SECURE MESSAGES;

EID: 75749102533     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2009.09.009     Document Type: Article
Times cited : (31)

References (18)
  • 1
    • 33750065702 scopus 로고    scopus 로고
    • Privacy in encrypted content distribution using private broadcast encryption
    • A. Barth, D. Boneh, B. Waters, Privacy in encrypted content distribution using private broadcast encryption, in: Financial Cryptography '06, 2006, pp. 52-64.
    • (2006) Financial Cryptography '06 , pp. 52-64
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 2
    • 34548731375 scopus 로고    scopus 로고
    • J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: SP '07, 2007, pp. 321-334.
    • J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: SP '07, 2007, pp. 321-334.
  • 3
    • 33745166648 scopus 로고    scopus 로고
    • D. Boneh, C. Gentry, B. Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys, in: CRYPTO '05, 2005, pp. 258-275.
    • D. Boneh, C. Gentry, B. Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys, in: CRYPTO '05, 2005, pp. 258-275.
  • 4
    • 0032627571 scopus 로고    scopus 로고
    • I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, Key management for secure internet multicast using boolean function minimization techniques, in: INFOCOM '99, 2, 1999, pp. 689-698.
    • I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, Key management for secure internet multicast using boolean function minimization techniques, in: INFOCOM '99, vol. 2, 1999, pp. 689-698.
  • 5
    • 58049200643 scopus 로고    scopus 로고
    • Collusion-resistant group key management using attribute-based encryption, in: Cryptology ePrint Archive
    • Report 2007/161
    • L. Cheung, J.A. Cooley, R. Khazan, C. Newport, Collusion-resistant group key management using attribute-based encryption, in: Cryptology ePrint Archive, Report 2007/161, 2007.
    • (2007)
    • Cheung, L.1    Cooley, J.A.2    Khazan, R.3    Newport, C.4
  • 6
    • 45749116552 scopus 로고    scopus 로고
    • L. Cheung, C. Newport, Provably secure ciphertext policy abe, in: CCS '07, 2007, pp. 456-465.
    • L. Cheung, C. Newport, Provably secure ciphertext policy abe, in: CCS '07, 2007, pp. 456-465.
  • 7
    • 0037250696 scopus 로고    scopus 로고
    • Multicast over wireless mobile ad hoc networks: present and future directions
    • Cordeiro C.D.M., Gossain H., and Agrawal D.P. Multicast over wireless mobile ad hoc networks: present and future directions. IEEE Network 17 (2003) 52-59
    • (2003) IEEE Network , vol.17 , pp. 52-59
    • Cordeiro, C.D.M.1    Gossain, H.2    Agrawal, D.P.3
  • 8
    • 84979291225 scopus 로고    scopus 로고
    • A. Fiat, M. Naor, Broadcast encryption, in: CRYPTO '93, 1993, pp. 480-491.
    • A. Fiat, M. Naor, Broadcast encryption, in: CRYPTO '93, 1993, pp. 480-491.
  • 9
    • 0034475750 scopus 로고    scopus 로고
    • C. Grosch, Framework for anonymity in ip-multicast environments, in: GLOBECOM '00, 2000, pp. 365-369.
    • C. Grosch, Framework for anonymity in ip-multicast environments, in: GLOBECOM '00, 2000, pp. 365-369.
  • 12
    • 84880852861 scopus 로고    scopus 로고
    • D. Naor, M. Naor, J. Lotspiech, Revocation and tracing schemes for stateless receivers, in: CRYPTO '01, 2001, pp. 41-62.
    • D. Naor, M. Naor, J. Lotspiech, Revocation and tracing schemes for stateless receivers, in: CRYPTO '01, 2001, pp. 41-62.
  • 14
    • 75749135340 scopus 로고    scopus 로고
    • A. Pfitzmann, M.K. Anonymity, unobservability, and pseudeonymity - a proposal for terminology, in: International Workshop on Designing Privacy Enhancing Technologies, 2001, pp. 1-9.
    • A. Pfitzmann, M.K. Anonymity, unobservability, and pseudeonymity - a proposal for terminology, in: International Workshop on Designing Privacy Enhancing Technologies, 2001, pp. 1-9.
  • 15
    • 0042878478 scopus 로고    scopus 로고
    • Multicast over wireless networks
    • Upkar V. Multicast over wireless networks. Commun. ACM 45 12 (2002) 31-37
    • (2002) Commun. ACM , vol.45 , Issue.12 , pp. 31-37
    • Upkar, V.1
  • 17
    • 44049096615 scopus 로고    scopus 로고
    • Secure anonymous group infrastructure for common and future internet applications
    • N. Weiler, Secure anonymous group infrastructure for common and future internet applications, in: ACSAC 2001, Proceedings 17th Annual, 2001, pp. 401-410.
    • (2001) ACSAC 2001, Proceedings 17th Annual , pp. 401-410
    • Weiler, N.1
  • 18
    • 70349086608 scopus 로고    scopus 로고
    • Attribute-based on-demand multicast group setup with membership anonymity
    • S. Yu, K. Ren, W. Lou, Attribute-based on-demand multicast group setup with membership anonymity, in: Secure Comm '08, 2008.
    • (2008) Secure Comm '08
    • Yu, S.1    Ren, K.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.