On some methods for unconditionally secure key distribution and broadcast encryption
From MaRDI portal
Recommendations
- Some new results on key distribution patterns and broadcast encryption
- Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes
- A broadcast key distribution scheme based on block designs
- Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
- scientific article; zbMATH DE number 1024079
Cited in
(36)- A framework for unconditionally secure public-key encryption (with possible decryption errors)
- Linear key predistribution schemes
- Multicast key distribution schemes based on Stinson-Van Trung designs
- Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage
- On \(\tau\)-time secure key agreement
- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
- Advances in Cryptology - ASIACRYPT 2003
- Constructions for key distribution patterns
- On the construction of \((w,r)\) cover-free codes
- RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES
- Linear Time Constructions of Some $$d$$-Restriction Problems
- Provably secure (broadcast) homomorphic signcryption
- Generalized cover-free families.
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
- Complete tree subset difference broadcast encryption scheme and its analysis
- Explicit constructions of separating hash families from algebraic curves over finite fields
- On optimal cryptographic key derivation
- A broadcast key distribution scheme based on block designs
- UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
- On key storage in secure networks
- Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes
- Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- Generation of key predistribution schemes using secret sharing schemes
- Unconditional secure conference key distribution schemes with disenrollment capability
- Linear broadcast encryption schemes
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Key distribution system based on Hadamard designs
- Broadcast authentication for group communication
- Multireceiver authentication codes: Models, bounds, constructions, and extensions
- An application of ramp schemes to broadcast encryption
- Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
- A ramp model for distributed key distribution schemes
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- Generation of key predistribution schemes using secret sharing schemes
This page was built for publication: On some methods for unconditionally secure key distribution and broadcast encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1369720)