One-Way Chain Based Broadcast Encryption Schemes
From MaRDI portal
Publication:5385751
DOI10.1007/11426639_33zbMATH Open1137.94347OpenAlexW1485287359MaRDI QIDQ5385751FDOQ5385751
Author name not available (Why is that?)
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_33
Cited In (12)
- Implementing broadcast encryption scheme using bilinear map and group characteristic
- Complete tree subset difference broadcast encryption scheme and its analysis
- A one-round secure message broadcasting protocol through a key sharing tree
- Lower Bounds for Subset Cover Based Broadcast Encryption
- Ternary Subset Difference Method and Its Quantitative Analysis
- A mechanism for communication-efficient broadcast encryption over wireless ad hoc networks
- The average transmission overhead for broadcast encryption
- On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems
- Information Security and Privacy
- Tree based symmetric key broadcast encryption
- Fighting Pirates 2.0
- A note on the security of KHL scheme
Recommendations
- Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption π π
- Title not available (Why is that?) π π
- Information Security and Privacy π π
- Broadcast encryption scheme based on secret sharing π π
- A one-round secure message broadcasting protocol through a key sharing tree π π
- Linear broadcast encryption schemes π π
- Linear broadcast encryption schemes π π
- Efficient Semi-static Secure Broadcast Encryption Scheme π π
- Security notions for broadcast encryption π π
- Title not available (Why is that?) π π
This page was built for publication: One-Way Chain Based Broadcast Encryption Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5385751)