Sciweavers

215 search results - page 4 / 43
» Key Management for Encrypted broadcast
Sort
View
100
Voted
IMA
2009
Springer
136views Cryptology» more  IMA 2009»
15 years 10 months ago
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Hao Chen, San Ling, Carles Padró, Huaxiong ...
102
Voted
EJWCN
2011
119views more  EJWCN 2011»
14 years 10 months ago
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks
Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, A...
132
Voted
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
158
Voted
CRYPTO
2000
Springer
136views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Long-Lived Broadcast Encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually he...
Juan A. Garay, Jessica Staddon, Avishai Wool
133
Voted
CCS
2006
ACM
15 years 7 months ago
A fully collusion resistant broadcast, trace, and revoke system
We introduce a simple primitive called Augmented Broadcast Encryption (ABE) that is sufficient for constructing broadcast encryption, traitor-tracing, and trace-and-revoke systems...
Dan Boneh, Brent Waters