-
1
-
-
79960886232
-
Secure group key management using uni-directional proxy re-encryption schemes
-
Y.-R. Chen, J. D. Tygar, and W.-G. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2011, pp. 1952-1960.
-
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 2011
, pp. 1952-1960
-
-
Chen, Y.-R.1
Tygar, J.D.2
Tzeng, W.-G.3
-
2
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of the International Cryptology Conference (CRYPTO), 2005, pp. 258-275.
-
Proceedings of the International Cryptology Conference (CRYPTO), 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
5
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Proceedings of the International Cryptology Conference (CRYPTO), 2001, pp. 41-62.
-
Proceedings of the International Cryptology Conference (CRYPTO), 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 1999, pp. 708-716.
-
Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), 1999
, pp. 708-716
-
-
Canetti, R.1
Garay, J.A.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
7
-
-
84942438500
-
Batch rekeying for secure group communications
-
X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communications," in Proceedings of the International World Wide Web Conference (WWW), 2001, pp. 525-534.
-
Proceedings of the International World Wide Web Conference (WWW), 2001
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
8
-
-
0034838199
-
Elk, a new protocol for efficient large-group key distribution
-
A. Perrig, D. X. Song, and J. D. Tygar, "Elk, a new protocol for efficient large-group key distribution," in Proceedings of the IEEE Symposium on Security and Privacy (S & P), 2001, pp. 247-262.
-
Proceedings of the IEEE Symposium on Security and Privacy (S & P), 2001
, pp. 247-262
-
-
Perrig, A.1
Song, D.X.2
Tygar, J.D.3
-
9
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
10
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
11
-
-
54349088694
-
Secure and efficient group key management with shared key derivation
-
J.-C. Lin, K.-H. Huang, F. Lai, and H.-C. Lee, "Secure and efficient group key management with shared key derivation," Computer Standards & Interfaces, vol. 31, no. 1, pp. 192-208, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 192-208
-
-
Lin, J.-C.1
Huang, K.-H.2
Lai, F.3
Lee, H.-C.4
-
12
-
-
50149109026
-
Optimal communication complexity of generic multicast key distribution
-
D. Micciancio and S. Panjwani, "Optimal communication complexity of generic multicast key distribution," IEEE/ACM Transactions on Networking, vol. 16, no. 4, pp. 803-813, 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.4
, pp. 803-813
-
-
Micciancio, D.1
Panjwani, S.2
-
13
-
-
0036590079
-
Cryptanalysis of a key management scheme for secure multicast communications
-
G. Horng, "Cryptanalysis of a key management scheme for secure multicast communications," IEICE Transactions on Communications, vol. E85-B, no. 5, pp. 1050-1051, 2000.
-
(2000)
IEICE Transactions on Communications
, vol.E85-B
, Issue.5
, pp. 1050-1051
-
-
Horng, G.1
-
15
-
-
38049052454
-
Preventing collusion attacks on the one-way function tree (oft) scheme
-
X. Xu, L. Wang, A. M. Youssef, and B. Zhu, "Preventing collusion attacks on the one-way function tree (oft) scheme," in Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2007, pp. 177-193.
-
Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2007
, pp. 177-193
-
-
Xu, X.1
Wang, L.2
Youssef, A.M.3
Zhu, B.4
-
16
-
-
80051726298
-
Collusion-resistant multicast key distribution based on homomorphic one-way function trees
-
2
-
J. Liu and B. Yang, "Collusion-resistant multicast key distribution based on homomorphic one-way function trees," IEEE Transactions on Information Forensics and Security, vol. 6, no. 3-2, pp. 980-991, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.3
, pp. 980-991
-
-
Liu, J.1
Yang, B.2
-
17
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1-30, 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
18
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998, pp. 127-144.
-
Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 1998
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
20
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proceedings of the International Cryptology Conference (CRYPTO), 1996, pp. 1-15.
-
Proceedings of the International Cryptology Conference (CRYPTO), 1996
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
|