An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A matrix key-distribution scheme
Journal of Cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
New Combinatorial Bounds for Authentication Codes and KeyPredistribution Schemes
Designs, Codes and Cryptography
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks
ICICS '99 Proceedings of the Second International Conference on Information and Communication Security
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Some Bounds and a Construction for Secure Broadcast Encryption
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Communication in key distribution schemes
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In Key Predistribution Scheme(KPS) and One-Time use Broadcast Encryption Schemes(OTBES) a Trusted Authority(TA) generates secret information and distributes part of it to users. It also has to observe users' dishonest acts to prevent collusion attacks. However, these tasks can be heavy for a TA if there are a large number of users in the system. In this paper, we propose Hierarchically Structured KPS(HS-KPS) as an effiective solution for this problem. Then we evaluate its performance in terms of efficiency, security and memory size.