Complete tree subset difference broadcast encryption scheme and its analysis
DOI10.1007/S10623-012-9702-6zbMath1259.94044OpenAlexW2009927223WikidataQ122179050 ScholiaQ122179050MaRDI QIDQ1934221
Palash Sarkar, Sanjay Bhattacherjee
Publication date: 28 January 2013
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: http://roar.uel.ac.uk/7817/1/3.pdf
recurrenceprobabilistic analysisasymptotic analysiscombinatorial analysisbroadcast encryptionsubset differencetransmission overheadexpected header length
Cryptography (94A60) Dynamic programming (90C39) Data encryption (aspects in computer science) (68P25) Combinatorial probability (60C05)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Establishing the broadcast efficiency of the subset difference revocation scheme
- On some methods for unconditionally secure key distribution and broadcast encryption
- Linear broadcast encryption schemes
- Linear key predistribution schemes
- Improving the trade-off between storage and communication in broadcast encryption schemes
- On the mean number of encryptions for tree-based broadcast encryption schemes
- Security Notions for Broadcast Encryption
- Lower Bounds for Subset Cover Based Broadcast Encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes
- A Revocation Scheme with Minimal Storage at Receivers
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Advances in Cryptology – CRYPTO 2004
- Information Security and Privacy
- One-Way Chain Based Broadcast Encryption Schemes
- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Advances in Cryptology - ASIACRYPT 2003
- Dynamic traitor tracing
This page was built for publication: Complete tree subset difference broadcast encryption scheme and its analysis