A one-round secure message broadcasting protocol through a key sharing tree (Q989505): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Q4409119 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365747 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The dining cryptographers problem: Unconditional sender and recipient untraceability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737267 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4947393 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4287359 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3140454 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035713 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Hypergraphs: Privacy from Partial Broadcast / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure communication in minimal connectivity models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418642 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Characterization of optimal key set protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250775 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure communication in multicast channels: The answer to Franklin and Wright's question / rank
 
Normal rank

Revision as of 02:20, 3 July 2024

scientific article
Language Label Description Also known as
English
A one-round secure message broadcasting protocol through a key sharing tree
scientific article

    Statements

    A one-round secure message broadcasting protocol through a key sharing tree (English)
    0 references
    0 references
    0 references
    0 references
    20 August 2010
    0 references
    cryptography
    0 references
    design of algorithms
    0 references
    key sharing graph
    0 references
    multiparty secret key exchange
    0 references
    information-theoretic security
    0 references

    Identifiers