• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 441
Next 10 →

Broadcast Encryption

by Amos Fiat, Moni Naor , 1994
"... We introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions. The goal is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients while minimizing key management related ..."
Abstract - Cited by 331 (8 self) - Add to MetaCart
We introduce new theoretical measures for the qualitative and quantitative assessment of encryption schemes designed for broadcast transmissions. The goal is to allow a central broadcast site to broadcast secure transmissions to an arbitrary set of recipients while minimizing key management related

Broadcast Encryption

by Ahmed Obied , 2005
"... Broadcast encryption is an interesting application of cryptography which allows one to broadcast a secret to a changing group of intended recipients in such a way that no one outside this group can view the secret. Interest in using broadcast encryption techniques has grown considerably in recent ye ..."
Abstract - Add to MetaCart
Broadcast encryption is an interesting application of cryptography which allows one to broadcast a secret to a changing group of intended recipients in such a way that no one outside this group can view the secret. Interest in using broadcast encryption techniques has grown considerably in recent

Broadcast Encryption

by Krishnaram Kenthapadi , 2003
"... Our system consists of a center and a set, U of n users. The center provides keys to the users when they join the system. Later on, the center wants to broadcast an encrypted message (such as the password to view “Matrix”) which can be deciphered only by a dynamically changing privileged subset of u ..."
Abstract - Add to MetaCart
Our system consists of a center and a set, U of n users. The center provides keys to the users when they join the system. Later on, the center wants to broadcast an encrypted message (such as the password to view “Matrix”) which can be deciphered only by a dynamically changing privileged subset

Linear Broadcast Encryption Schemes

by Carles Padró, Ignacio Gracia, Sebastià Martín, Paz Morillo , 2001
"... A new family of broadcast encryption schemes (BESs), which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provide a general framework to the study of broadcast encryption ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
A new family of broadcast encryption schemes (BESs), which will be called linear broadcast encryption schemes (LBESs), is presented in this paper by using linear algebraic techniques. This family generalizes most previous proposals and provide a general framework to the study of broadcast

The LSD Broadcast Encryption Scheme

by Dani Halevy, Adi Shamir , 2002
"... Abstract. Broadcast Encryption schemes enable a center to broadcast encrypted programs so that only designated subsets of users can decrypt each program. The stateless variant of this problem provides each user with a fixed set of keys which is never updated. The best scheme published so far for thi ..."
Abstract - Cited by 113 (0 self) - Add to MetaCart
Abstract. Broadcast Encryption schemes enable a center to broadcast encrypted programs so that only designated subsets of users can decrypt each program. The stateless variant of this problem provides each user with a fixed set of keys which is never updated. The best scheme published so far

Combinatorial Bounds for Broadcast Encryption

by Michael Luby, Jessica Staddon , 1998
"... Abstract. A broadcast encryption system allows a center to communi-cate securely over a broadcast channel with selected sets of users. Each time the set of privileged users changes, the center enacts a protocol to establish a new broadcast key that only the privileged users can obtain, and subsequen ..."
Abstract - Cited by 65 (0 self) - Add to MetaCart
Abstract. A broadcast encryption system allows a center to communi-cate securely over a broadcast channel with selected sets of users. Each time the set of privileged users changes, the center enacts a protocol to establish a new broadcast key that only the privileged users can obtain

Long-lived broadcast encryption

by Juan A. Garay, Jessica Staddon, Avishai Wool - In Advances in Cryptology - Crypto 2000 , 2000
"... Abstract. In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamper-resistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking ..."
Abstract - Cited by 55 (3 self) - Add to MetaCart
Abstract. In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamper-resistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking

A Survey of Broadcast Encryption

by Jeremy Horwitz , 2003
"... Broadcast encryption is the problem of a sending an encrypted message to a large user base such that the message can only be decrypted by a dynamically changing privileged subset. The study of broadcast encryption has become more and more important with the ever-increasing concern about copyright is ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Broadcast encryption is the problem of a sending an encrypted message to a large user base such that the message can only be decrypted by a dynamically changing privileged subset. The study of broadcast encryption has become more and more important with the ever-increasing concern about copyright

Identity-Based Broadcast Encryption

by Ryuichi Sakai, Jun Furukawa
"... Abstract. Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only nonrevoked receivers can decrypt them. Identity-based encryption schemes are public key encryption schemes that can use arbitrary strings as public keys. We propo ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract. Broadcast encryption schemes enable senders to efficiently broadcast ciphertexts to a large set of receivers in a way that only nonrevoked receivers can decrypt them. Identity-based encryption schemes are public key encryption schemes that can use arbitrary strings as public keys. We

Decentralized Dynamic Broadcast Encryption

by Duong Hieu Phan, David Pointcheval, Mario Strefler
"... Abstract A broadcast encryption system generally involves three kinds of entities: the group manager that deals with the membership, the encryptor that encrypts the data to the registered users according to a specific policy (the target set), and the users that decrypt the data if they are authorize ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract A broadcast encryption system generally involves three kinds of entities: the group manager that deals with the membership, the encryptor that encrypts the data to the registered users according to a specific policy (the target set), and the users that decrypt the data
Next 10 →
Results 1 - 10 of 441
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University