On some methods for unconditionally secure key distribution and broadcast encryption
From MaRDI portal
Publication:1369720
DOI10.1023/A:1008268610932zbMATH Open0880.94009OpenAlexW1590263452WikidataQ56554911 ScholiaQ56554911MaRDI QIDQ1369720FDOQ1369720
Authors: D. R. Stinson
Publication date: 27 January 1998
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1023/a:1008268610932
Recommendations
- Some new results on key distribution patterns and broadcast encryption
- Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes
- A broadcast key distribution scheme based on block designs
- Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
- scientific article; zbMATH DE number 1024079
Cited In (33)
- Complete tree subset difference broadcast encryption scheme and its analysis
- Generalized cover-free families.
- Improving the trade-off between storage and communication in broadcast encryption schemes
- Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
- On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
- On key storage in secure networks
- An application of ramp schemes to broadcast encryption
- Provably Secure (Broadcast) Homomorphic Signcryption
- Explicit constructions of separating hash families from algebraic curves over finite fields
- Broadcast authentication for group communication
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- Multireceiver authentication codes: Models, bounds, constructions, and extensions
- On the construction of \((w,r)\) cover-free codes
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- Title not available (Why is that?)
- A framework for unconditionally secure public-key encryption (with possible decryption errors)
- Advances in Cryptology - ASIACRYPT 2003
- Unconditional secure conference key distribution schemes with disenrollment capability
- A ramp model for distributed key distribution schemes
- Generation of key predistribution schemes using secret sharing schemes
- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
- Multicast key distribution schemes based on Stinson-Van Trung designs
- Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes
- Generation of key predistribution schemes using secret sharing schemes
- On \(\tau\)-time secure key agreement
- Constructions for key distribution patterns
- Linear broadcast encryption schemes
- Linear key predistribution schemes
- RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
- Linear Time Constructions of Some $$d$$-Restriction Problems
- On optimal cryptographic key derivation
- UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
This page was built for publication: On some methods for unconditionally secure key distribution and broadcast encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1369720)