Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
暂无分享,去创建一个
Patrick Traynor | Patrick D. McDaniel | William Enck | Kevin R. B. Butler | P. Mcdaniel | Patrick Traynor | W. Enck
[1] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[2] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[3] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[4] Functional model of a conditional access system , .
[5] Bob Briscoe,et al. Nark: receiver-based multicast non-repudiation and key management , 1999, EC '99.
[6] N. Meyers,et al. H = W. , 1964, Proceedings of the National Academy of Sciences of the United States of America.
[7] Sean W. Smith,et al. Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.
[8] Brian Weis,et al. The Multicast Group Security Architecture , 2004, RFC.
[9] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[10] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[11] Marina Blanton,et al. Secret Handshakes with Dynamic and Fuzzy Matching , 2007, NDSS.
[12] Atul Prakash,et al. Antigone: A Flexible Framework for Secure Group Communication , 1999, USENIX Security Symposium.
[13] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[14] Rakesh Bobba,et al. Using Attribute-Based Access Control to Enable Attribute-Based Messaging , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[15] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[16] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[17] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[18] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[19] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[20] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[21] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[22] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[23] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Adi Shamir,et al. How to share a secret , 1979, CACM.
[26] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[27] Brent Waters,et al. Secure attribute-based systems , 2006, CCS '06.
[28] Bob Briscoe,et al. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences , 1999, Networked Group Communication.
[29] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[30] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.