Broadcast authentication for group communication
From MaRDI portal
Publication:5958610
DOI10.1016/S0304-3975(00)00184-5zbMath0983.68069MaRDI QIDQ5958610
Reihaneh Safavi-Naini, Huaxiong Wang
Publication date: 3 March 2002
Published in: Theoretical Computer Science (Search for Journal in Brave)
perfect hash familyauthenticationbroadcast authenticationgroup communicationkey distribution patternmultireceiver authentication code
Network design and communication in computer systems (68M10) Data encryption (aspects in computer science) (68P25)
Related Items (1)
Cites Work
- The combinatorics of authentication and secrecy codes
- A matrix key-distribution scheme
- Families of finite sets in which no set is covered by the union of \(r\) others
- Key storage in secure networks
- New hash functions and their use in authentication and set equality
- Families of finite sets in which no set is covered by the union of two others
- Optimal linear perfect hash families
- Some constructions for key distribution patterns
- Universal hashing and geometric codes
- On some methods for unconditionally secure key distribution and broadcast encryption
- Perfect hashing
- Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
- Key distribution patterns using Minkowski planes
- Multireceiver authentication codes: Models, bounds, constructions, and extensions
- On key storage in secure networks
- Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
- Efficient Multiplicative Sharing Schemes
- Keying Hash Functions for Message Authentication
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Broadcast authentication for group communication