Broadcast Encryption Schemes: A Comparative Study
暂无分享,去创建一个
[1] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[2] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[3] Jessica Staddon,et al. Combinatorial Bounds for Broadcast Encryption , 1998, EUROCRYPT.
[4] Pil Joong Lee,et al. An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, ASIACRYPT.
[5] Wen-Guey Tzeng,et al. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares , 2001, Public Key Cryptography.
[6] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[7] Moni Naor,et al. Efficient Trace and Revoke Schemes , 2000, Financial Cryptography.
[8] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[9] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[10] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[11] Donald F. Towsley,et al. On Dynamic Subset Difference Revocation Scheme , 2004, NETWORKING.
[12] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[13] Aggelos Kiayias,et al. Scalable public-key tracing and revoking , 2003, PODC '03.
[14] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.