2005
DOI: 10.1007/11506157_8
|View full text |Cite
|
Sign up to set email alerts
|

A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2006
2006
2011
2011

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Asano [Asa02] and [AK05] proposed very interesting schemes with constant size private keys. Because private keys in these scheme are of constant size, one might think traitors cannot contribute a partial key information to the public and that pirates 2.0 can then be excluded.…”
Section: Framework Firstmentioning
confidence: 99%
See 1 more Smart Citation
“…Asano [Asa02] and [AK05] proposed very interesting schemes with constant size private keys. Because private keys in these scheme are of constant size, one might think traitors cannot contribute a partial key information to the public and that pirates 2.0 can then be excluded.…”
Section: Framework Firstmentioning
confidence: 99%
“…This consideration might fail to cover attacks who can derive some partial decryption keys from a set of its key and then could use the partial key to break the security. al's schemes [Asa02,AK05]) keys corresponding to intermediate nodes in the tree. We also note that the previous schemes in the subset-cover framework are susceptible to pirate evolution attacks because each user can always possess (or derive, in Asano et.…”
Section: Definition 4 (Resistance To Pevoa) a System Is Susceptible mentioning
confidence: 99%