Perfectly secure key distribution for dynamic conferences
From MaRDI portal
Publication:1273875
DOI10.1006/inco.1998.2717zbMath0921.68129OpenAlexW2105514582MaRDI QIDQ1273875
Carlo Blundo, Alfredo De Santis, Shay Kutten, Ugo Vaccaro, Amir Herzberg, Mordechai M. Yung
Publication date: 30 March 1999
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1006/inco.1998.2717
Network design and communication in computer systems (68M10) Computing methodologies and applications (68U99)
Related Items (15)
The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network ⋮ A power efficient aggregation of encrypted data in wireless sensor network ⋮ Improving the trade-off between storage and communication in broadcast encryption schemes ⋮ UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS ⋮ Random key predistribution for wireless sensor networks using deployment knowledge ⋮ Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures ⋮ Leakage Resilience of the Blom’s Key Distribution Scheme ⋮ A unified approach to combinatorial key predistribution schemes for sensor networks ⋮ Perennial secure multi-party computation of universal Turing machine ⋮ Sharing multiple secrets: Models, schemes and analysis ⋮ Chaotic synchronization cryptosystems combined with RSA encryption algorithm ⋮ On \(\tau\)-time secure key agreement ⋮ A ramp model for distributed key distribution schemes ⋮ Linear broadcast encryption schemes ⋮ Secure Node Discovery in Ad-hoc Networks and Applications
Cites Work
- A matrix key-distribution scheme
- A key distribution system equivalent to factoring
- Secure communications over insecure channels
- Identity-Based Cryptosystems and Signature Schemes
- New directions in cryptography
- A conference key distribution system
- Using encryption for authentication in large networks of computers
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Perfectly secure key distribution for dynamic conferences