Broadcast encryption schemes based on RSA

被引:2
|
作者
MU, Ning-bo [1 ]
HU, Yu-pu [1 ]
OU, Hai-wen [2 ]
机构
[1] The Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an, 710071, China
[2] Key Laboratory of Information Security and Secrecy, Beijing Institute of Electronic Science and Technology, Beijing, 100070, China
关键词
Compendex;
D O I
10.1016/S1005-8885(08)60181-8
中图分类号
学科分类号
摘要
Cryptography
引用
收藏
页码:69 / 75
相关论文
共 50 条
  • [11] An application of ramp schemes to broadcast encryption
    Stinson, DR
    Wei, R
    INFORMATION PROCESSING LETTERS, 1999, 69 (03) : 131 - 135
  • [12] Identity-Based Broadcast Encryption Schemes For Open Networks
    Li, Mingchu
    Xu, Xiaodong
    Zhuang, Ruhan
    Guo, Cheng
    Tan, Xing
    2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
  • [13] One-way chain based broadcast encryption schemes
    Jho, NS
    Hwang, JY
    Cheon, JH
    Kim, MH
    Lee, DH
    Yoo, ES
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 559 - 574
  • [14] Some RSA-based encryption, schemes with tight security reduction
    Kurosawa, K
    Takagi, T
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 19 - 36
  • [15] Analysis of broadcast schemes that implement identity-based encryption algorithms
    Kulakov A.N.
    Aleksandrova E.B.
    Autom. Control Comput. Sci., 8 (790-797): : 790 - 797
  • [16] On the mean number of encryptions for tree-based broadcast encryption schemes
    Park, E. C.
    Blake, I. F.
    JOURNAL OF DISCRETE ALGORITHMS, 2006, 4 (02) : 215 - 238
  • [17] Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (06) : 1248 - 1251
  • [18] Security weaknesses of certain broadcast encryption schemes
    Mihaljevic, Miodrag J.
    Fossorier, Marc P. C.
    Imai, Hideki
    DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS, 2006, 3919 : 228 - 245
  • [19] Improved broadcast encryption schemes with enhanced security
    Ke, Lishan
    Yi, Zongxiang
    Ren, Yan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (01) : 121 - 129
  • [20] Generic transformation for scalable broadcast encryption schemes
    Hwang, JY
    Lee, DH
    Lim, J
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 276 - 292