UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
From MaRDI portal
Publication:3173476
DOI10.1142/S0129054111008763zbMath1236.94080OpenAlexW2077005773MaRDI QIDQ3173476
Shaoquan Jiang, Reihaneh Safavi-Naini
Publication date: 10 October 2011
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054111008763
Cites Work
- Key storage in secure networks
- Perfectly secure key distribution for dynamic conferences
- Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
- On some methods for unconditionally secure key distribution and broadcast encryption
- A -restricted key agreement scheme
- Elements of Information Theory
This page was built for publication: UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS