메뉴 건너뛰기




Volumn 1975, Issue , 2000, Pages 224-236

A practical implementation of hierarchically structured key predistribution system and its evaluation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY;

EID: 77951290674     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44456-4_17     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 1
    • 84989455644 scopus 로고
    • On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem
    • LNCS 293, Springer-Verlag
    • T. Matsumoto and H. Imai, "On the KEY PREDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem," Proc. of CRYPTO'87, LNCS 293, Springer-Verlag, pp.185-193, 1988.
    • (1988) Proc. of CRYPTO'87 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 2
    • 84884730529 scopus 로고
    • An Optimal Class of Symmetric Key Generation Systems
    • LNCS 209, Springer-Verlag
    • R. Blom, "An Optimal Class of Symmetric Key Generation Systems," Proc. of Eurocrypt'84, LNCS 209, Springer-Verlag, pp.335-338, 1985.
    • (1985) Proc. of Eurocrypt'84 , pp. 335-338
    • Blom, R.1
  • 4
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
    • LNCS 1109, Springer-Verlag
    • C. Blundo, L.A. Frota Mattos and D.R. Stinson, "Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution," Proc. of CRYPTO'96, LNCS 1109, Springer-Verlag, pp. 387-400, 1996.
    • (1996) Proc. of CRYPTO'96 , pp. 387-400
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 5
    • 0025212474 scopus 로고
    • A Matrix Key-Distribution Scheme
    • Springer-Verlag
    • L. Gong and D. J. Wheeler, "A Matrix Key-Distribution Scheme," Journal of Cryptology, vol. 2, pp.51-59, Springer-Verlag, 1993.
    • (1993) Journal of Cryptology , vol.2 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 6
    • 84966614707 scopus 로고
    • Multisecret Threshold Schemes
    • LNCS 773, Springer-Verlag
    • W. A. Jackson, K. M. Martin, and C. M. O'Keefe, "Multisecret Threshold Schemes," Proc. of CRYPTO'93, LNCS 773, pp.126-135, Springer-Verlag, 1994.
    • (1994) Proc. of CRYPTO'93 , pp. 126-135
    • Jackson, W.A.1    Martin, K.M.2    O'keefe, C.M.3
  • 7
    • 84944242803 scopus 로고    scopus 로고
    • Unconditionally Secure Dynamic Conference Key Distribution
    • Y. Desmedt and V. Viswanathan, "Unconditionally Secure Dynamic Conference Key Distribution," IEEE, ISIT'98, 1998.
    • (1998) IEEE, ISIT'98
    • Desmedt, Y.1    Viswanathan, V.2
  • 8
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • LNCS 773, Springer-Verlag
    • A. Fiat and M. Naor, "Broadcast Encryption," Proc. of CRYPTO'93, LNCS 773, Springer-Verlag, pp.480-491, 1994.
    • (1994) Proc. of CRYPTO'93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 9
    • 22844455143 scopus 로고    scopus 로고
    • An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks
    • LNCS 1716, Springer-Verlag
    • G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai, "An Efficient Hierarchical Identity-based Key-Sharing Method Resistant against Collusion-Attacks," Proc. of Asiacrypt'99, LNCS 1716, Springer-Verlag, pp.348-362, 1999.
    • (1999) Proc. of Asiacrypt'99 , pp. 348-362
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 11
    • 0242621246 scopus 로고    scopus 로고
    • New Combimatorial Bounds for Authentication Codes and Key Predistribution Schemes
    • K. Kurosawa, K. Okada, H. Saido and D. Stinson, "New Combimatorial Bounds for Authentication Codes and Key Predistribution Schemes," Designs, Codes and Cryptography, 15, pp.87-100, 1998.
    • (1998) Designs, Codes and Cryptography , vol.15 , pp. 87-100
    • Kurosawa, K.1    Okada, K.2    Saido, H.3    Stinson, D.4
  • 12
    • 84947803330 scopus 로고    scopus 로고
    • Some Bounds and a Construction for Secure Broadcast Encryption
    • LNCS 1514, Springer-Verlag
    • K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, "Some Bounds and a Construction for Secure Broadcast Encryption," Proc. of Asiacrypt'98, LNCS 1514, Springer-Verlag, pp. 420-433, 1998.
    • (1998) Proc. of Asiacrypt'98 , pp. 420-433
    • Kurosawa, K.1    Yoshida, T.2    Desmedt, Y.3    Burmester, M.4
  • 14
    • 0000028420 scopus 로고    scopus 로고
    • On Some Methods for Unconditionally Secure Key Distribution System and Broadcast Encryption
    • D. Stinson, "On Some Methods for Unconditionally Secure Key Distribution System and Broadcast Encryption," Designs, Codes and Cryptography, 12, pp.215-243, 1997.
    • (1997) Designs, Codes and Cryptography , vol.12 , pp. 215-243
    • Stinson, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.