Selected Areas in Cryptography 1997
DOI: 10.1007/978-1-4615-5489-9_2
|View full text |Cite
|
Sign up to set email alerts
|

On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0
2

Year Published

1999
1999
2012
2012

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(65 citation statements)
references
References 31 publications
0
63
0
2
Order By: Relevance
“…There have been several works in this area [Sti97], [SW98] since then, but the most popular scheme out of these is the tree-based Subset Difference (SD) method of [NNL01]. Since it is a symmetric key based scheme, it is very efficient in terms of encryption and decryption time.…”
Section: What Is Broadcast Encryption?mentioning
confidence: 99%
“…There have been several works in this area [Sti97], [SW98] since then, but the most popular scheme out of these is the tree-based Subset Difference (SD) method of [NNL01]. Since it is a symmetric key based scheme, it is very efficient in terms of encryption and decryption time.…”
Section: What Is Broadcast Encryption?mentioning
confidence: 99%
“…Blundo, Mattos and Stinson [7], as well as Kurosawa, Yoshida, Desmedt and Burmester [21] showed other interesting bounds on required memory sizes. In [29], in depth survey of various constructions of KPS and corresponding properties has been investigated. KPS may seem to be the best building blocks for unconditionally secure communication systems, however, they are not suitable for certain applications e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Key distribution patterns (KDP) [16] are explicitly or implicitly used by numerous authors to construct key distribution systems [9,12,14,17,22,23] …”
Section: A General Constructionmentioning
confidence: 99%
“…A Key Distribution Systems (KDS) is one of the main primitives for distributing keys in network and group communication [22]. In a KDS, the collection of all subsets of n users is divided into privileged subsets and forbidden subsets.…”
Section: A Secure Dynamic Conference Systemmentioning
confidence: 99%