On some methods for unconditionally secure key distribution and broadcast encryption

From MaRDI portal
Publication:1369720

DOI10.1023/A:1008268610932zbMath0880.94009OpenAlexW1590263452MaRDI QIDQ1369720

Douglas R. Stinson

Publication date: 27 January 1998

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1023/a:1008268610932




Related Items (26)

An application of ramp schemes to broadcast encryptionImproving the trade-off between storage and communication in broadcast encryption schemesUNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONSExplicit constructions of separating hash families from algebraic curves over finite fieldsOn the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor NetworksBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresOn optimal cryptographic key derivationLinear Time Constructions of Some $$d$$-Restriction ProblemsComplete tree subset difference broadcast encryption scheme and its analysisUnconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and RobustnessUnnamed ItemConstructions for key distribution patternsGeneralized cover-free families.Unconditional secure conference key distribution schemes with disenrollment capabilityMulticast key distribution schemes based on Stinson-Van Trung designsBroadcast authentication for group communicationProvably Secure (Broadcast) Homomorphic SigncryptionOn the construction of \((w,r)\) cover-free codesOn \(\tau\)-time secure key agreementA ramp model for distributed key distribution schemesLinear broadcast encryption schemesGeneration of key predistribution schemes using secret sharing schemesGeneralized Beimel-Chor schemes for broadcast encryption and interactive key distributionSecure frameproof codes, key distribution patterns, group testing algorithms and related structuresRESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMESMultireceiver authentication codes: Models, bounds, constructions, and extensions




This page was built for publication: On some methods for unconditionally secure key distribution and broadcast encryption