-
1
-
-
84989455644
-
On the KEY REDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem
-
I. T. Matsumoto and H. Imai, "On the KEY REDISTRIBUTION SYSTEM: A Practical Solution to the Key Distribution Problem," Proc. of CRYPTO'87, LNCS 293, Springer-Verlag, pp.185-193, 1987.
-
(1987)
Proc. Of CRYPTO'87, LNCS 293, Springer-Verlag
, pp. 185-193
-
-
Matsumoto, I.T.1
Imai, H.2
-
3
-
-
84990731886
-
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
-
A. Fiat and A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," Proc. of CRYPTO'86, LNCS 263, Springer-Verlag, pp.186-194, 1986
-
(1986)
Proc. Of CRYPTO'86, LNCS 263, Springer-Verlag
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
4
-
-
85020598353
-
Identity-Based Crypto sy stem sand Signature Schemes
-
A. Shamir, "Identity-Based Crypto sy stem sand Signature Schemes," Proc. of CRYPTO'84, LNCS 196, Springer-Verlag, pp.47-53, 1985.
-
(1985)
Proc. Of CRYPTO'84, LNCS 196, Springer-Verlag
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
3042553102
-
Non-interactive Public-Key Cryptography
-
U. Maurer and Y. Yacobi, "Non-interactive Public-Key Cryptography," Proc. of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.498-407, 1992.
-
(1992)
Proc. Of Eurocrypt'91, LNCS 547, Springer-Verlag
, pp. 407-498
-
-
Maurer, U.1
Yacobi, Y.2
-
6
-
-
85027164248
-
A Remark on a Non-interactive Public-Key Distribution System
-
U. Maurer and Y. Yacobi, "A Remark on a Non-interactive Public-Key Distribution System," Proc. of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.458-460, 1993.
-
(1993)
Proc. Of Eurocrypt'92, LNCS 658, Springer-Verlag
, pp. 458-460
-
-
Maurer, U.1
Yacobi, Y.2
-
7
-
-
0024612164
-
Identity-Based Information Security management System for Personal Comuputer Networks
-
E. Okamoto and K. Tanaka, "Identity-Based Information Security management System for Personal Comuputer Networks," IEEE J. on Selected Area sin Com-mun., 7, 2, pp.290-294, 1989.
-
(1989)
IEEE J. On Selected Area Sin Com-Mun.
, vol.7
, Issue.2
, pp. 290-294
-
-
Okamoto, E.1
Tanaka, K.2
-
8
-
-
85032215902
-
A Realization Scheme of the Identity-Based Cryptosy stem s
-
H. Tanaka, "A Realization Scheme of the Identity-Based Cryptosy stem s," Proc. of CRYPTO'87, LNCS 293, Springer-Verlag, pp.340-349, 1988.
-
(1988)
Proc. Of CRYPTO'87, LNCS 293, Springer-Verlag
, pp. 340-349
-
-
Tanaka, H.1
-
9
-
-
84955595899
-
A New ID-Based Key Sharing System
-
S. T sujii and J. Chao, "A New ID-Based Key Sharing System," Proc. of CRYPTO'91, LNCS 576, Springer-Verlag, pp.288-299, 1992.
-
(1992)
Proc. Of CRYPTO'91, LNCS 576, Springer-Verlag
, pp. 288-299
-
-
Sujii, S.T.1
Chao, J.2
-
10
-
-
84956862641
-
Attack on the Cryptographica Scheme NIKS-TAS
-
D. Coppersmith, "Attack on the Cryptographica Scheme NIKS-TAS," Proc. of CRYPTO'94, LNCS 839, Springer-Varlag, pp.40-49, 1994.
-
(1994)
Proc. Of CRYPTO'94, LNCS 839, Springer-Varlag
, pp. 40-49
-
-
Coppersmith, D.1
-
11
-
-
0025212474
-
A Matrix Key-Distribution Scheme
-
L. Gong and D. J. Wheeler, "A Matrix Key-Distribution Scheme," Journal of Cryptology, vol. 2, pp.51-59, Springer-Verlag, 1993.
-
(1993)
Journal of Cryptology
-
-
Gong, L.1
Wheeler, D.J.2
-
12
-
-
84966614707
-
Multisecret Threshold Schemes
-
W. A. Jackson, K. M. Martin, and C. M. O'Keefe, "Multisecret Threshold Schemes, " Proc. of CRYPTO'93, LNCS 773, pp.126-135, Springer-Verlag, 1994.
-
(1994)
Proc. Of CRYPTO'93, LNCS 773, Pp.126-135, Springer-Verlag
-
-
Jackson, W.A.1
Martin, K.M.2
O'keefe, C.M.3
-
13
-
-
84944242803
-
Unconditionally Secure Dynamic Conference Key Distribution
-
Y. Desmedt and V. Viswanathan, "Unconditionally Secure Dynamic Conference Key Distribution," IEEE, ISIT'98, 1998.
-
(1998)
IEEE, ISIT'98
-
-
Desmedt, Y.1
Viswanathan, V.2
-
14
-
-
85028765277
-
Perfectly Secure Key Distribution for Dynamic Conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, "Perfectly Secure Key Distribution for Dynamic Conferences," Proc. of CRYPTO '92, LNCS 740, Springer-Verlag, pp.471-486, 1993.
-
(1993)
Proc. Of CRYPTO '92, LNCS 740, Springer-Verlag
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
15
-
-
84955614214
-
Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution
-
C. Blundo, L.A. Frota Matto sand D.R. Stinson, "Trade-offs between Communication and Strage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution," Proc. of CRYPTO '96, LNCS 1109, Springer-Verlag, pp.387-400, 1996.
-
(1996)
Proc. Of CRYPTO '96, LNCS 1109, Springer-Verlag
, pp. 387-400
-
-
Blundo, C.1
Rota Matto S, L.A.F.2
Stinson, D.R.3
-
16
-
-
85094036157
-
Space Requirement s for Broadcast Encryption
-
C. Blundo and A. Cresti, "Space Requirement s for Broadcast Encryption," Proc. of Eurocrypt '94, LNCS 950, Springer-Verlag, pp.287-298, 1995.
-
(1995)
Proc. Of Eurocrypt '94, LNCS 950, Springer-Verlag
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
17
-
-
84979291225
-
Broadcast Encryption
-
A. Fiat and M. Naor, "Broadcast Encryption," Proc. of CRYPTO '93, LNCS 773, Springer-Verlag, pp.480-491, 1994.
-
(1994)
Proc. Of CRYPTO '93, LNCS 773, Springer-Verlag
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
18
-
-
0242621246
-
New Combimatorial Bound s for Authentication Code sand Key Predistribution Schemes
-
K. Kurosawa, K. Okada and H. Saido, "New Combimatorial Bound s for Authentication Code sand Key Predistribution Schemes," Designs, Code sand Cryptography, 15, pp.87-100, 1998.
-
(1998)
Designs, Code Sand Cryptography
, vol.15
, pp. 87-100
-
-
Kurosawa, K.1
Okada, K.2
Saido, H.3
-
19
-
-
84947803330
-
Some Bound sand a Construction for Secure Broadcast Encryption
-
K. Kurosawa, T. Yoshida, Y. Desmedt and M. Burmester, "Some Bound sand a Construction for Secure Broadcast Encryption," Proc. of ASIACRYPT '98, LNCS 1514, Springer-Verlag, pp.420-433, 1998.
-
(1998)
Proc. Of ASIACRYPT '98, LNCS 1514, Springer-Verlag
, pp. 420-433
-
-
Kurosawa, K.1
Yoshida, T.2
Desmedt, Y.3
Burmester, M.4
-
20
-
-
0009441615
-
A Prototype KPS and It s Application - IC Card Based Key Sharing and Cryptographic Communication -
-
T. Matsumoto, Y. Takashima, H. Imai, M. Sasaki, H. Yoshikawa, and S. Watanabe, "A Prototype KPS and It s Application - IC Card Based Key Sharing and Cryptographic Communication -," Trans. of IEICE Vol. E 73, No. 7, July 1990, pp.1111-1119, 1990.
-
(1990)
Trans. Of IEICE
, vol.73
, Issue.7
, pp. 1111-1119
-
-
Matsumoto, T.1
Takashima, Y.2
Imai, H.3
Sasaki, M.4
Yoshikawa, H.5
Watanabe, S.6
|