메뉴 건너뛰기




Volumn 6, Issue 3 PART 2, 2011, Pages 980-991

Collusion-resistant multicast key distribution based on homomorphic one-way function trees

Author keywords

Collusion; homomorphism; multicast key distribution; one way function tree

Indexed keywords

COLLUSION; COLLUSION ATTACK; COMMUNICATION EFFICIENCY; COMMUNICATION OVERHEADS; GRAPH OPERATIONS; GROUP KEY; HOMOMORPHISM; KEY DISTRIBUTION; MULTICASTS; ONE-WAY FUNCTION TREE; SECURITY MODEL; SECURITY SERVICES; STRUCTURE-PRESERVING; SUFFICIENT CONDITIONS;

EID: 80051726298     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2144584     Document Type: Article
Times cited : (16)

References (21)
  • 1
    • 0001293053 scopus 로고
    • Broadcast encryption
    • ser. Lecture Notes in Computer Science, D. R. Stinson, Ed. Santa Barbara, CA: Springer-Verlag
    • A. Fiat and M. Naor, "Broadcast encryption", in Advances in Cryptology-Crypto'93, ser. Lecture Notes in Computer Science, D. R. Stinson, Ed. Santa Barbara, CA: Springer-Verlag, 1993.
    • (1993) Advances in Cryptology-Crypto'93
    • Fiat, A.1    Naor, M.2
  • 3
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • DOI 10.1109/90.836475
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000. (Pubitemid 30584705)
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 5
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees", IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Softw. Eng. , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 6
    • 50149109026 scopus 로고    scopus 로고
    • Optimal communication complexity of generic multicast key distribution
    • Aug.
    • D. Micciancio and S. Panjwani, "Optimal communication complexity of generic multicast key distribution", IEEE/ACM Trans. Netw., vol. 16, no. 4, pp. 803-813, Aug. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.4 , pp. 803-813
    • Micciancio, D.1    Panjwani, S.2
  • 8
    • 0036590079 scopus 로고    scopus 로고
    • Cryptanalysis of a key management scheme for secure multicast communications
    • G. Horng, "Cryptanalysis of a key management scheme for secure multicast communications", IEICE Trans. Commun., vol. E85-B, no. 5, pp. 1050-1051, 2002.
    • (2002) IEICE Trans. Commun. , vol.E85-B , Issue.5 , pp. 1050-1051
    • Horng, G.1
  • 9
    • 84943248325 scopus 로고    scopus 로고
    • An improved key management scheme for large dynamic groups using one-way function trees
    • W. C. Ku and S. M. Chen, "An improved key management scheme for large dynamic groups using one-way function trees", in Proc. Int. Conf. Parallel Processing Workshops, 2003, pp. 391-396.
    • (2003) Proc. Int. Conf. Parallel Processing Workshops , pp. 391-396
    • Ku, W.C.1    Chen, S.M.2
  • 12
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • DOI 10.1145/359340.359342
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Advances in Cryptology - CRYPTO 2001
    • D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers", in Proc. Advances in Cryptology- CRYPTO'2001, New York, 2001, pp. 41-62, Lecture Notes in Computer Science. (Pubitemid 33317907)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 14
    • 84880171922 scopus 로고    scopus 로고
    • Private group communication: Two perspectives and a unifying solution
    • Dept., Univ. California. San Diego, CA
    • S. Panjwani, Private Group Communication: Two Perspectives and a Unifying Solution, Comput. Sci. Eng. Dept., Univ. California. San Diego, CA, 2007.
    • (2007) Comput. Sci. Eng.
    • Panjwani, S.1
  • 16
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • J. Stern, Ed., Lecture Notes in Computer Science
    • R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption", in Proc. Advances in Cryptology-Eurocrypt'99, J. Stern, Ed., 1999, pp. 459-474, Lecture Notes in Computer Science.
    • (1999) Proc. Advances in Cryptology-Eurocrypt'99 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 17
  • 18
    • 84957656774 scopus 로고    scopus 로고
    • MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences
    • B. Briscoe, "MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences", in Proc. Networked Group Communication 1999, pp. 301-320.
    • (1999) Proc. Networked Group Communication , pp. 301-320
    • Briscoe, B.1
  • 20
    • 84948668912 scopus 로고    scopus 로고
    • HySOR: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers
    • J. Fan, P. Judge, and M. H. Ammar, "HySOR: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers", in Proc. 11th Int. Conf. Computer Communications and Networks, 2002, pp. 196-201.
    • (2002) Proc. 11th Int. Conf. Computer Communications and Networks , pp. 196-201
    • Fan, J.1    Judge, P.2    Ammar, M.H.3
  • 21
    • 38049040237 scopus 로고    scopus 로고
    • Tackling adaptive corruptions in multicast encryption protocols
    • Amsterdam, The Netherlands
    • S. Panjwani, "Tackling adaptive corruptions in multicast encryption protocols", in Proc. 4th Conf. Theory of Cryptography, Amsterdam, The Netherlands, 2007, pp. 21-40.
    • (2007) Proc. 4th Conf. Theory of Cryptography , pp. 21-40
    • Panjwani, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.