Computer Networks
Cryptography and data security
Cryptography and data security
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
On key distribution via true broadcasting
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast security and its extension to a mobile environment
Wireless Networks
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Using Compatible Keys for Secure Multicasting in E-Commerce
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
A Multi-party Optimistic Non-repudiation Protocol
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Constant Size Rekeying Message Framework for Secure Multicasting
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security - IFIP 2000
A middleware service for secure group communication in mobile ad hoc networks
Journal of Systems and Software - Special issue: Computer software & applications
Key management for high bandwidth secure multicast
Journal of Computer Security
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A unified model for unconditionally secure key distribution
Journal of Computer Security
Efficient group key management for multi-privileged groups
Computer Communications
Packet construction for secure conference call request in ad hoc network systems
Information Sciences: an International Journal
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Collision attacks with budget constraints on key management schemes for secure multimedia multicast
IEEE Transactions on Multimedia - Special section on communities and media computing
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Formal analysis and improvement of multi-party non-repudiation protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Evaluation and analysis of computational complexity for secure multicast models
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
An optimal subset cover for broadcast encryption
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Cryptanalysis of two group key management protocols for secure multicast
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient architectural support for secure bus-based shared memory multiprocessor
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Journal of Computational and Applied Mathematics
Secure broadcasting in large networks
Computer Communications
Non-repudiation protocols for multiple entities
Computer Communications
Group key agreement for secure group communication in dynamic peer systems
Journal of Parallel and Distributed Computing
Towards secure and communication-efficient broadcast encryption systems
Journal of Network and Computer Applications
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
High Performance Group Merging/Splitting Scheme for Group Key Management
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The authors discuss secure broadcasting, effected by means of a secure lock, on broadcast channels, such as satellite, radio, etc. This lock is implemented by using the Chinese Remainder theorem (CRT). The secure lock offers the following advantages: only one copy of the ciphertext is sent; the deciphering operation is efficient; and the number of secret keys held by each user is minimized. Protocols for secure broadcasting using the secure lock, based on the public-key cryptosystem as well as the private-key cryptosystem, are presented.