UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
From MaRDI portal
Publication:3173476
DOI10.1142/S0129054111008763zbMATH Open1236.94080OpenAlexW2077005773MaRDI QIDQ3173476FDOQ3173476
Shaoquan Jiang, Reihaneh Safavi-Naini
Publication date: 10 October 2011
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1142/s0129054111008763
Recommendations
- Unconditional secure conference key distribution schemes with disenrollment capability
- scientific article; zbMATH DE number 2044520
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- Unconditionally secure key agreement and the intrinsic conditional information
- Attainable unconditional security for shared-key cryptosystems
- On some methods for unconditionally secure key distribution and broadcast encryption
- scientific article; zbMATH DE number 1952894
- scientific article; zbMATH DE number 708825
- Perfectly secure key distribution for dynamic conferences
- Constructions and bounds for unconditionally secure non-interactive commitment schemes
Cites Work
- Elements of Information Theory
- On some methods for unconditionally secure key distribution and broadcast encryption
- Key storage in secure networks
- Perfectly secure key distribution for dynamic conferences
- Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution
- A -restricted key agreement scheme
Cited In (7)
- Unconditional secure communication: a Russian cards protocol
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures
- Perfectly secure key distribution for dynamic conferences
- Title not available (Why is that?)
- Unconditional secure conference key distribution schemes with disenrollment capability
- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)
- Constructions and bounds for unconditionally secure non-interactive commitment schemes
This page was built for publication: UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3173476)