Design theory
An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Codes and cryptography
Key storage in secure networks
Discrete Applied Mathematics
A matrix key-distribution scheme
Journal of Cryptology
An explication of secret sharing schemes
Designs, Codes and Cryptography
Some constructions for key distribution patterns
Designs, Codes and Cryptography
On key distribution via true broadcasting
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Three characterizations of non-binary correlation-immune and resilient functions
Designs, Codes and Cryptography
A study of correlation-immune, resilient and related cryptographic functions
A study of correlation-immune, resilient and related cryptographic functions
Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds
SIAM Journal on Discrete Mathematics
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Secret-Key Agreement without Public-Key Cryptography
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Interaction in Key Distribution Schemes (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Bounds for Resilient Functions and Orthogonal Arrays
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Incidence Structures for Key Sharing (Extended Abstract)
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Broadcast Key Distribution Scheme Based on Block Designs
Proceedings of the 5th IMA Conference on Cryptography and Coding
Communication in key distribution schemes
IEEE Transactions on Information Theory
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
Bounds and Combinatorial Structure of (k,n)Multi-Receiver A-Codes
Designs, Codes and Cryptography
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
On the Distribution of a Key Distribution Center
ICTCS '01 Proceedings of the 7th Italian Conference on Theoretical Computer Science
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Efficient Revocation Schemes for Secure Multicast
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Key Preassigned Traceability Schemes for Broadcast Encryption
SAC '98 Proceedings of the Selected Areas in Cryptography
A Combinatorial Approach to Anonymous Membership Broadcast
COCOON '02 Proceedings of the 8th Annual International Conference on Computing and Combinatorics
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Some Bounds and a Construction for Secure Broadcast Encryption
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Bounds and Constructions for Multireceiver Authentication Codes
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Unconditionally Secure Anonymous Encryption and Group Authentication
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ISW '00 Proceedings of the Third International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Efficient Methods for Integrating Traceability and Broadcast Encryption
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A ramp model for distributed key distribution schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Broadcast encryption with short keys and transmissions
Proceedings of the 3rd ACM workshop on Digital rights management
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Improving the trade-off between storage and communication in broadcast encryption schemes
Discrete Applied Mathematics
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Graceful service degradation (or, how to know your payment is late)
Proceedings of the 6th ACM conference on Electronic commerce
Key management for high bandwidth secure multicast
Journal of Computer Security
Explicit constructions of separating hash families from algebraic curves over finite fields
Designs, Codes and Cryptography
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
Multicast key distribution schemes based on Stinson-Van Trung designs
Cybernetics and Systems Analysis
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
On the construction of (w, r) cover-free codes
Problems of Information Transmission
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Linear threshold multisecret sharing schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
An optimal subset cover for broadcast encryption
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Bounded-Collusion IBE from key homomorphism
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Complete tree subset difference broadcast encryption scheme and its analysis
Designs, Codes and Cryptography
Hi-index | 0.00 |
This paper provides an exposition of methods by whicha trusted authority can distribute keys and/or broadcast a messageover a network, so that each member of a privileged subset ofusers can compute a specified key or decrypt the broadcast message.Moreover, this is done in such a way that no coalition is ableto recover any information on a key or broadcast message theyare not supposed to know. The problems are studied using thetools of information theory, so the security provided is unconditional(i.e., not based on any computational assumption).We begin by surveying some useful schemes for key distributionthat have been presented in the literature, giving backgroundand examples (but not too many proofs). In particular, we lookmore closely at the attractive concept of key distribution patterns,and present a new method for making these schemes more efficientthrough the use of resilient functions. Then we present a generalapproach to the construction of broadcast schemes that combineskey predistribution schemes with secret sharing schemes. We discussthe Fiat-Naor Broadcast Scheme, as well as other, new schemesthat can be constructed using this approach.