Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time
From MaRDI portal
Publication:1628270
DOI10.1007/s12046-018-0917-8zbMath1402.94066OpenAlexW2883937309WikidataQ123277933 ScholiaQ123277933MaRDI QIDQ1628270
Gaurav Pareek, B. R. Purushothama
Publication date: 4 December 2018
Published in: Sādhanā (Search for Journal in Brave)
Full work available at URL: https://www.ias.ac.in/describe/article/sadh/043/09/0137
group key managementcollusion-secure proxy re-encryptionlogical key hierarchymulti-cast securityre-encryption key derivation
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Secure multicast in dynamic environments
- Scalable solutions for secure group communications
- Multi-use and unidirectional identity-based proxy re-encryption schemes
- Improved proxy re-encryption schemes with applications to secure distributed storage
- Identity-Based Encryption from the Weil Pairing
- Information and Communications Security
- Public Key Cryptography - PKC 2005
This page was built for publication: Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time