메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 241-257

Self-healing key distribution with revocation

Author keywords

Broadcasting; Cryptography; Multicast communication; Privacy; Risk analysis; Risk management; Security; Telecommunication traffic

Indexed keywords

BROADCASTING; CRYPTOGRAPHY; DATA PRIVACY; MANAGERS; RECOVERY; RISK ANALYSIS; RISK MANAGEMENT; TELECOMMUNICATION TRAFFIC;

EID: 79952238646     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2002.1004375     Document Type: Conference Paper
Times cited : (119)

References (43)
  • 1
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman Problem
    • Proceedings of the Third Algorithmic Number Theory Symposium
    • D. Boneh. The Decision Diffie-Hellman Problem. In Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science 1423, pp. 48-63, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 2
    • 0005944705 scopus 로고    scopus 로고
    • Interaction in Key Distribution Schemes
    • Advances in Cryptology - Crypto '93
    • A. Beimel and B. Chor. Interaction in Key Distribution Schemes. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 444-455.
    • Lecture Notes in Computer Science , vol.773 , pp. 444-455
    • Beimel, A.1    Chor, B.2
  • 3
    • 84945119254 scopus 로고    scopus 로고
    • Entity Authentication and Key Distribution
    • Advances in Cryptology - Crypto '93
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 232-249.
    • Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 85030481487 scopus 로고    scopus 로고
    • How to Broadcast a Secret
    • Advances in Cryptology - Eurocrypt '91
    • S. Berkovit. How to Broadcast a Secret. In Advances in Cryptology - Eurocrypt '91, Lecture Notes in Computer Science 547, pp. 536-541.
    • Lecture Notes in Computer Science , vol.547 , pp. 536-541
    • Berkovit, S.1
  • 6
    • 33645422534 scopus 로고    scopus 로고
    • Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
    • S. Blake-Wilson and A. Menezes. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. In the Security Protocols Workshop '97.
    • The Security Protocols Workshop '97
    • Blake-Wilson, S.1    Menezes, A.2
  • 8
    • 84955614214 scopus 로고    scopus 로고
    • Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
    • Advances in Cryptology - Crypto '96
    • C. Blundo, L. Frota Mattos and D. Stinson. Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution. In Advances in Cryptology - Crypto '96, Lecture Notes in Computer Science 1109, pp. 387-400.
    • Lecture Notes in Computer Science , vol.1109 , pp. 387-400
    • Blundo, C.1    Frota Mattos, L.2    Stinson, D.3
  • 10
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public Key Traitor Tracing Scheme
    • Advances in Cryptology - Crypto '99
    • D. Boneh and M. Franklin. An Efficient Public Key Traitor Tracing Scheme. In Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science 1666, pp. 338-353.
    • Lecture Notes in Computer Science , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 11
    • 0032661699 scopus 로고    scopus 로고
    • Multicast Security: A Taxonomy and Some Efficient Constructions
    • March
    • R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In IEEE INFOCOM, 2 (March 1999), pp. 708-716.
    • (1999) IEEE INFOCOM , vol.2 , pp. 708-716
    • Canetti, R.1    Garay, J.2    Itkis, G.3    Micciancio, D.4    Naor, M.5    Pinkas, B.6
  • 12
    • 84957623200 scopus 로고    scopus 로고
    • Efficient Communication-Storage Tradeoffs for Multicast Encryption
    • Advances in Cryptology - Eurocrypt '99
    • R. Canetti, T. Malkin and K. Nissim. Efficient Communication-Storage Tradeoffs for Multicast Encryption. In Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science 1592, pp. 459-474.
    • Lecture Notes in Computer Science , vol.1592 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 14
    • 35048893575 scopus 로고    scopus 로고
    • A Key Distribution System Based on any One-Way Function
    • Advances in Cryptology - Eurocrypt '89
    • G. Davida, Y. Desmedt and R. Peralta. A Key Distribution System Based on any One-Way Function. In Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434, pp. 75-79.
    • Lecture Notes in Computer Science , vol.434 , pp. 75-79
    • Davida, G.1    Desmedt, Y.2    Peralta, R.3
  • 17
    • 84979291225 scopus 로고    scopus 로고
    • Broadcast Encryption
    • Advances in Cryptology - Crypto '93
    • A. Fiat and M. Naor. Broadcast Encryption. In Advances in Cryptology - Crypto '93, Lecture Notes in Computer Science 773, pp. 480-491.
    • Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 18
    • 85030309762 scopus 로고    scopus 로고
    • A Modular Approach to key Distribution
    • Advances in Cryptology - Crypto '90
    • W. Fumy and M. Munzert. A Modular Approach to key Distribution. In Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science 537, pp. 274-283.
    • Lecture Notes in Computer Science , vol.537 , pp. 274-283
    • Fumy, W.1    Munzert, M.2
  • 19
    • 22844455143 scopus 로고    scopus 로고
    • An Efficient Hierarchichal Identity-Based Key-Sharing Method Resistant Against Collusion-Attacks
    • G. Hanaoka, T. Nishioka, Y. Zheng and H. Imai. An Efficient Hierarchichal Identity-Based Key-Sharing Method Resistant Against Collusion-Attacks. In Advances in Cryptology - Asiacrypt '99, pp. 348-362.
    • Advances in Cryptology - Asiacrypt '99 , pp. 348-362
    • Hanaoka, G.1    Nishioka, T.2    Zheng, Y.3    Imai, H.4
  • 21
    • 84957057937 scopus 로고    scopus 로고
    • Coding constructions for blacklisting problems without computational assumptions
    • Advances in Cryptology - Crypto '99
    • R. Kumar, S. Rajagopalan and A. Sahai. Coding constructions for blacklisting problems without computational assumptions. In Advances in Cryptology - Crypto '99, Lecture Notes in Computer Science 1666, pp. 609-623.
    • Lecture Notes in Computer Science , vol.1666 , pp. 609-623
    • Kumar, R.1    Rajagopalan, S.2    Sahai, A.3
  • 22
    • 84958986237 scopus 로고    scopus 로고
    • Key Management for Secure Multicast with Dynamic Controllers
    • Fifth Australasian Conference on Information Security and Privacy, ACISP 2000
    • H. Kurnio, R. Safavi-Naini, W. Susilo and H. Wang. Key Management for Secure Multicast with Dynamic Controllers. Fifth Australasian Conference on Information Security and Privacy, ACISP 2000, Lecture Notes in Computer Science 1841, pp. 178-190.
    • Lecture Notes in Computer Science , vol.1841 , pp. 178-190
    • Kurnio, H.1    Safavi-Naini, R.2    Susilo, W.3    Wang, H.4
  • 23
    • 84989455644 scopus 로고    scopus 로고
    • On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
    • Advances in Cryptology - Crypto '87
    • T. Matsumoto and H. Imai. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. In Advances in Cryptology - Crypto '87, Lecture Notes in Computer Science 293, pp. 185-193.
    • Lecture Notes in Computer Science , vol.293 , pp. 185-193
    • Matsumoto, T.1    Imai, H.2
  • 25
    • 77951458752 scopus 로고    scopus 로고
    • Information-Theoretically Secure Secret-Key Agreement by not Authenticated Public Discussion
    • Advances in Cryptology - Eurocrypt '97
    • U. Maurer. Information-Theoretically Secure Secret-Key Agreement by not Authenticated Public Discussion. In Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science 1233, pp. 209-225.
    • Lecture Notes in Computer Science , vol.1233 , pp. 209-225
    • Maurer, U.1
  • 28
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless users
    • Advances in Cryptology - Crypto '01
    • D. Naor, M. Naor and J. Lotspiech. Revocation and Tracing Schemes for Stateless users. In Advances in Cryptology - Crypto '01, Lecture Notes in Computer Science 2139, pp. 41-62.
    • Lecture Notes in Computer Science , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 29
    • 84944319284 scopus 로고    scopus 로고
    • Efficient Trace and Revoke Schemes
    • Proceedings of Financial Cryptography 2000
    • M. Naor and B. Pinkas. Efficient Trace and Revoke Schemes. In Proceedings of Financial Cryptography 2000, Lecture Notes in Computer Science (2001) 1962 pp. 1-20.
    • (2001) Lecture Notes in Computer Science , vol.1962 , pp. 1-20
    • Naor, M.1    Pinkas, B.2
  • 32
    • 0034448865 scopus 로고    scopus 로고
    • New Constructions of Secure Multicast Re-keying Schemes using Perfect Hash Families
    • ACM Press
    • R. Safavi-Naini and H. Wang. New Constructions of Secure Multicast Re-keying Schemes using Perfect Hash Families. 7th ACM Conference on Computer and Communication Security, ACM Press, 2000, pp. 228-234.
    • (2000) 7th ACM Conference on Computer and Communication Security , pp. 228-234
    • Safavi-Naini, R.1    Wang, H.2
  • 34
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. In Communications of the ACM, 22, 1979, pp. 612-613.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 35
    • 84947904235 scopus 로고    scopus 로고
    • Session Key Distribution Using Smart Cards
    • Advances in Cryptology - Eurocrypt '96
    • V. Shoup and A. Rubin. Session Key Distribution Using Smart Cards. In Advances in Cryptology - Eurocrypt '96, Lecture Notes in Computer Science 1070, pp. 321-331.
    • Lecture Notes in Computer Science , vol.1070 , pp. 321-331
    • Shoup, V.1    Rubin, A.2
  • 36
    • 84898275803 scopus 로고    scopus 로고
    • Prepositioned Shared Secret and/or Shared Control Schemes
    • Advances in Cryptology - Eurocrypt '89
    • G. Simmons. Prepositioned Shared Secret and/or Shared Control Schemes. In Advances in Cryptology - Eurocrypt '89, Lecture Notes in Computer Science 434, pp. 436-467.
    • Lecture Notes in Computer Science , vol.434 , pp. 436-467
    • Simmons, G.1
  • 37
    • 84890047469 scopus 로고    scopus 로고
    • Key preassigned traceability schemes for broadcast encryption
    • Selected Areas in Cryptology - SAC '98
    • D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. in Selected Areas in Cryptology - SAC '98, Lecture Notes in Computer Science 1556, pp. 144-156.
    • Lecture Notes in Computer Science , vol.1556 , pp. 144-156
    • Stinson, D.R.1    Wei, R.2
  • 38
    • 84948979276 scopus 로고    scopus 로고
    • Formal Requirements for key Distribution Protocols
    • Advances in Cryptology - Eurocrypt '94
    • P. Syverson and C. Meadows. Formal Requirements for key Distribution Protocols. In Advances in Cryptology - Eurocrypt '94, Lecture Notes in Computer Science 950, pp. 320-331.
    • Lecture Notes in Computer Science , vol.950 , pp. 320-331
    • Syverson, P.1    Meadows, C.2
  • 40
    • 0003497269 scopus 로고    scopus 로고
    • Secure Group Communication Using Key Graphs
    • Also, University of Texas at Austin, Computer Science Technical Report TR
    • C. Wong, M. Gouda and S. Lam. Secure Group Communication Using Key Graphs. SIGCOMM '98. Also, University of Texas at Austin, Computer Science Technical Report TR 97-23.
    • SIGCOMM '98
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 42
    • 0348250970 scopus 로고    scopus 로고
    • A Key Distribution Paradox
    • Advances in Cryptology - Crypto '90
    • Y. Yacobi. A Key Distribution Paradox. In Advances in Cryptology - Crypto '90, Lecture Notes in Computer Science 537, pp. 268-273.
    • Lecture Notes in Computer Science , vol.537 , pp. 268-273
    • Yacobi, Y.1
  • 43
    • 85032878997 scopus 로고    scopus 로고
    • On Key Distribution Systems
    • Advances in Cryptology - Crypto '89
    • Y. Yacobi and Z. Shmuely. On Key Distribution Systems. In Advances in Cryptology - Crypto '89, Lecture Notes in Comouter Science 435, pp. 344-355.
    • Lecture Notes in Comouter Science , vol.435 , pp. 344-355
    • Yacobi, Y.1    Shmuely, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.