On some methods for unconditionally secure key distribution and broadcast encryption
From MaRDI portal
Publication:1369720
DOI10.1023/A:1008268610932zbMath0880.94009OpenAlexW1590263452MaRDI QIDQ1369720
Publication date: 27 January 1998
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1023/a:1008268610932
Related Items (26)
An application of ramp schemes to broadcast encryption ⋮ Improving the trade-off between storage and communication in broadcast encryption schemes ⋮ UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS ⋮ Explicit constructions of separating hash families from algebraic curves over finite fields ⋮ On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks ⋮ Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures ⋮ On optimal cryptographic key derivation ⋮ Linear Time Constructions of Some $$d$$-Restriction Problems ⋮ Complete tree subset difference broadcast encryption scheme and its analysis ⋮ Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness ⋮ Unnamed Item ⋮ Constructions for key distribution patterns ⋮ Generalized cover-free families. ⋮ Unconditional secure conference key distribution schemes with disenrollment capability ⋮ Multicast key distribution schemes based on Stinson-Van Trung designs ⋮ Broadcast authentication for group communication ⋮ Provably Secure (Broadcast) Homomorphic Signcryption ⋮ On the construction of \((w,r)\) cover-free codes ⋮ On \(\tau\)-time secure key agreement ⋮ A ramp model for distributed key distribution schemes ⋮ Linear broadcast encryption schemes ⋮ Generation of key predistribution schemes using secret sharing schemes ⋮ Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution ⋮ Secure frameproof codes, key distribution patterns, group testing algorithms and related structures ⋮ RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES ⋮ Multireceiver authentication codes: Models, bounds, constructions, and extensions
This page was built for publication: On some methods for unconditionally secure key distribution and broadcast encryption