Privacy amplification by public discussion
SIAM Journal on Computing - Special issue on cryptography
Key storage in secure networks
Discrete Applied Mathematics
Combinatorial designs and cryptography
Surveys in combinatorics, 1993
On families of hash functions via geometric codes and concatenation
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Three characterizations of non-binary correlation-immune and resilient functions
Designs, Codes and Cryptography
Orthogonal Arrays, Resilient Functions, Error-Correcting Codes, and Linear Programming Bounds
SIAM Journal on Discrete Mathematics
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Communications of the ACM
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Handbook of Combinatorial Designs, Second Edition (Discrete Mathematics and Its Applications)
Handbook of Combinatorial Designs, Second Edition (Discrete Mathematics and Its Applications)
Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
New constructions for multicast re-keying schemes using perfect hash families
Proceedings of the 7th ACM conference on Computer and communications security
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
A Secure Re-keying Scheme with Key Recovery Property
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Key Preassigned Traceability Schemes for Broadcast Encryption
SAC '98 Proceedings of the Selected Areas in Cryptography
Coding Constructions for Blacklisting Problems without Computational Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Towards Making Broadcast Encryption Practical
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Efficient Methods for Integrating Traceability and Broadcast Encryption
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Improving the trade-off between storage and communication in broadcast encryption schemes
Discrete Applied Mathematics
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Multicast key distribution schemes based on Stinson-Van Trung designs
Cybernetics and Systems Analysis
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Pay per view – a multimedia multicast application with effective key management
International Journal of Mobile Network Design and Innovation
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Generic transformation for scalable broadcast encryption schemes
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Privacy-preserving identity-based broadcast encryption
Information Fusion
Bounded-Collusion IBE from key homomorphism
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Hi-index | 0.00 |
This paper concerns methods by which a trusted authoritycan distribute keys and/or broadcast a message over a network,so that each member of a privileged subset of users can computea specified key or decrypt the broadcast message. Moreover, thisis done in such a way that no coalition is able to recover anyinformation on a key or broadcast message they are not supposedto know. The problems are studied using the tools of informationtheory, so the security provided is unconditional (i.e., notbased on any computational assumption).In a recent paper st95a, Stinson described a method of constructingkey predistribution schemes by combining Mitchell-Piper key distributionpatterns with resilient functions; and also presented a constructionmethod for broadcast encryption schemes that combines Fiat-Naorkey predistribution schemes with ideal secret sharing schemes.In this paper, we further pursue these two themes, providingseveral nice applications of these techniques by using combinatorialstructures such as orthogonal arrays, perpendicular arrays, Steinersystems and universal hash families.